Table of Contents
- About This Book
- Copyleft Notice
- Thanks
- Practicalities
- 1. Introduction
- 2. For Comprehensions
- 3. Application Design
- 4. Data and Functionality
- 5. Scalaz Typeclasses
- 6. Scalaz Data Types
- 7. Advanced Monads
- 8. Typeclass Derivation
- 9. Wiring up the Application
- Typeclass Cheatsheet
- Haskell
- Third Party Licenses
“Love is wise; hatred is foolish. In this world, which is getting more and more closely interconnected, we have to learn to tolerate each other, we have to learn to put up with the fact that some people say things that we don’t like. We can only live together in that way. But if we are to live together, and not die together, we must learn a kind of charity and a kind of tolerance, which is absolutely vital to the continuation of human life on this planet.”
― Bertrand Russell
About This Book
This book is for the typical Scala developer, probably with a Java background, who is both sceptical and curious about the Functional Programming (FP) paradigm. This book justifies every concept with practical examples, including writing a web application.
This book uses Scalaz 7.2, the most popular, stable, principled and comprehensive Functional Programming framework for Scala.
This book is designed to be read from cover to cover, in the order presented, with a rest between chapters. Earlier chapters encourage coding styles that we will later discredit: similar to how we learn Newton’s theory of gravity as children, and progress to Riemann / Einstein / Maxwell if we become students of physics.
A computer is not necessary to follow along, but studying the Scalaz source code is encouraged. Some of the more complex code snippets are available with the book’s source code and those who want practical exercises are encouraged to (re-)implement Scalaz (and the example application) using the partial descriptions presented in this book.
We also recommend The Red Book as further reading. It teaches how to write an FP library in Scala from first principles.
Copyleft Notice
This book is Libre and follows the philosophy of Free Software: you can use this book as you like, the source is available you can redistribute this book and you can distribute your own version. That means you can print it, photocopy it, e-mail it, upload it to websites, change it, translate it, charge for it, remix it, delete bits, and draw all over it.
This book is Copyleft: if you change the book and distribute your own version, you must also pass these freedoms to its recipients.
This book uses the Creative Commons Attribution ShareAlike 4.0 International (CC BY-SA 4.0) license.
All original code snippets in this book are separately CC0 licensed, you may use them without restriction. Excerpts from Scalaz and related libraries maintain their license, reproduced in full in the appendix.
The example application drone-dynamic-agents
is distributed under the terms of
the GPLv3: only the snippets in this book are available without restriction.
Thanks
Diego Esteban Alonso Blas, Raúl Raja Martínez and Peter Neyens of 47 degrees, Rúnar Bjarnason, Tony Morris, John de Goes and Edward Kmett for their help explaining the principles of FP. Kenji Yoshida and Jason Zaugg for being the main authors of Scalaz, and Paul Chiusano / Miles Sabin for fixing a critical bug in the Scala compiler (SI-2712).
Thanks to the readers who gave feedback on early drafts of this text.
Some material was particularly helpful for my own understanding of the concepts that are in this book. Thanks to Juan Manuel Serrano for All Roads Lead to Lambda, Pere Villega for On Free Monads, Dick Wall and Josh Suereth for For: What is it Good For?, Erik Bakker for Options in Futures, how to unsuck them, Noel Markham for ADTs for the Win!, Sukant Hajra for Classy Monad Transformers, Luka Jacobowitz for Optimizing Tagless Final, Vincent Marquez for Index your State, Gabriel Gonzalez for The Continuation Monad, and Yi Lin Wei / Zainab Ali for their tutorials at Hack The Tower meetups.
The helpul souls who patiently explained things to me: Merlin Göttlinger, Edmund Noble, Fabio Labella, Adelbert Chang, Michael Pilquist, Paul Snively, Daniel Spiewak, Stephen Compall, Brian McKenna, Ryan Delucchi, Pedro Rodriguez, Emily Pillmore, Aaron Vargo, Tomas Mikula, Jean-Baptiste Giraudeau, Itamar Ravid, Ross A. Baker, Alexander Konovalov, Harrison Houghton, Alexandre Archambault, Christopher Davenport, Jose Cardona, Isaac Elliott.
Practicalities
To set up a project that uses the libraries presented in this book, use a recent
version of Scala with FP-specific features enabled (e.g. in build.sbt
):
In order to keep our snippets short, we will omit the import
section. Unless told otherwise, assume that all snippets have the
following imports:
1. Introduction
It is human instinct to be sceptical of a new paradigm. To put some perspective on how far we have come, and the shifts we have already accepted on the JVM, let’s start with a quick recap of the last 20 years.
Java 1.2 introduced the Collections API, allowing us to write methods that abstracted over mutable collections. It was useful for writing general purpose algorithms and was the bedrock of our codebases.
But there was a problem, we had to perform runtime casting:
In response, developers defined domain objects in their business logic
that were effectively CollectionOfThings
, and the Collection API
became implementation detail.
In 2005, Java 5 introduced generics, allowing us to define
Collection<Thing>
, abstracting over the container and its
elements. Generics changed how we wrote Java.
The author of the Java generics compiler, Martin Odersky, then created Scala with a stronger type system, immutable data and multiple inheritance. This brought about a fusion of object oriented (OOP) and functional programming (FP).
For most developers, FP means using immutable data as much as
possible, but mutable state is still a necessary evil that must be
isolated and managed, e.g. with Akka actors or synchronized
classes.
This style of FP results in simpler programs that are easier to
parallelise and distribute, an improvement over Java. But it is only
scratching the surface of the benefits of FP, as we will discover in
this book.
Scala also brings Future
, making it easy to write asynchronous
applications. But when a Future
makes it into a return type,
everything needs to be rewritten to accomodate it, including the
tests, which are now subject to arbitrary timeouts.
We have a problem similar to Java 1.0: there is no way of abstracting over execution, much as we had no way of abstracting over collections.
1.1 Abstracting over Execution
Say we want to interact with the user over the command line interface. We can
read
what the user types and we can write
a message to them.
How do we write generic code that does something as simple as echo the user’s input synchronously or asynchronously depending on our runtime implementation?
We could write a synchronous version and wrap it with Future
but now
we have to worry about which thread pool we should be using for the
work, or we could Await.result
on the Future
and introduce thread
blocking. In either case, it is a lot of boilerplate and we are
fundamentally dealing with different APIs that are not unified.
We can solve the problem, like Java 1.2, with a common parent using the higher kinded types (HKT) Scala language feature.
We want to define Terminal
for a type constructor C[_]
. By
defining Now
to construct to its type parameter (like Id
), we can
implement a common interface for synchronous and asynchronous
terminals:
We can think of C
as a Context because we say “in the context of
executing Now
” or “in the Future
”.
But we know nothing about C
and we cannot do anything with a
C[String]
. What we need is a kind of execution environment that lets
us call a method returning C[T]
and then be able to do something
with the T
, including calling another method on Terminal
. We also
need a way of wrapping a value as a C[_]
. This signature works well:
letting us write:
We can now share the echo
implementation between synchronous and
asynchronous codepaths. We can write a mock implementation of
Terminal[Now]
and use it in our tests without any timeouts.
Implementations of Execution[Now]
and Execution[Future]
are
reusable by generic methods like echo
.
But the code for echo
is horrible!
The implicit class
Scala language feature gives C
some methods.
We will call these methods flatMap
and map
for reasons that will
become clearer in a moment. Each method takes an implicit
Execution[C]
, but this is nothing more than the flatMap
and map
that we’re used to on Seq
, Option
and Future
We can now reveal why we used flatMap
as the method name: it lets us
use a for comprehension, which is just syntax sugar over nested
flatMap
and map
.
Our Execution
has the same signature as a trait in Scalaz called Monad
,
except chain
is bind
and create
is pure
. We say that C
is monadic
when there is an implicit Monad[C]
available. In addition, Scalaz has the Id
type alias.
The takeaway is: if we write methods that operate on monadic types,
then we can write sequential code that abstracts over its execution
context. Here, we have shown an abstraction over synchronous and
asynchronous execution but it can also be for the purpose of more
rigorous error handling (where C[_]
is Either[Error, _]
), managing
access to volatile state, performing I/O, or auditing of the session.
1.2 Pure Functional Programming
Functional Programming is the act of writing programs with pure functions. Pure functions have three properties:
- Total: return a value for every possible input
- Deterministic: return the same value for the same input
- Inculpable: no (direct) interaction with the world or program state.
Together, these properties give us an unprecedented ability to reason about our code. For example, input validation is easier to isolate with totality, caching is possible when functions are deterministic, and interacting with the world is easier to control, and test, when functions are inculpable.
The kinds of things that break these properties are side effects: directly
accessing or changing mutable state (e.g. maintaining a var
in a class or
using a legacy API that is impure), communicating with external resources (e.g.
files or network lookup), or throwing and catching exceptions.
We write pure functions by avoiding exceptions, and interacting with the world
only through a safe F[_]
execution context.
In the previous section, we abstracted over execution and defined echo[Id]
and
echo[Future]
. We might reasonably expect that calling any echo
will not
perform any side effects, because it is pure. However, if we use Future
or
Id
as the execution context, our application will start listening to stdin:
We have broken purity and are no longer writing FP code: futureEcho
is the
result of running echo
once. Future
conflates the definition of a program
with interpreting it (running it). As a result, applications built with
Future
are difficult to reason about.
We can define a simple safe F[_]
execution context
which lazily evaluates a thunk. IO
is just a data structure that references
(potentially) impure code, it isn’t actually running anything. We can implement
Terminal[IO]
and call echo[IO]
to get back a value
This val delayed
can be reused, it is just the definition of the work to be
done. We can map the String
and compose additional programs, much as we would
map over a Future
. IO
keeps us honest that we are depending on some
interaction with the world, but does not prevent us from accessing the output of
that interaction.
The impure code inside the IO
is only evaluated when we .interpret()
the
value, which is an impure action
An application composed of IO
programs is only interpreted once, in the main
method, which is also called the end of the world.
In this book, we expand on the concepts introduced in this chapter and show how to write maintainable, pure functions, that achieve our business’s objectives.
2. For Comprehensions
Scala’s for
comprehension is the ideal FP abstraction for sequential
programs that interact with the world. Since we will be using it a lot,
we’re going to relearn the principles of for
and how Scalaz can help
us to write cleaner code.
This chapter doesn’t try to write pure programs and the techniques are applicable to non-FP codebases.
2.1 Syntax Sugar
Scala’s for
is just a simple rewrite rule, also called syntax
sugar, that doesn’t have any contextual information.
To see what a for
comprehension is doing, we use the show
and
reify
feature in the REPL to print out what code looks like after
type inference.
There is a lot of noise due to additional sugarings (e.g. +
is
rewritten $plus
, etc). We will skip the show
and reify
for brevity
when the REPL line is reify>
, and manually clean up the generated
code so that it doesn’t become a distraction.
The rule of thumb is that every <-
(called a generator) is a
nested flatMap
call, with the final generator a map
containing the
yield
body.
2.1.1 Assignment
We can assign values inline like ij = i + j
(a val
keyword is not
needed).
A map
over the b
introduces the ij
which is flat-mapped along
with the j
, then the final map
for the code in the yield
.
Unfortunately we cannot assign before any generators. It has been requested as a language feature but has not been implemented: https://github.com/scala/bug/issues/907
We can workaround the limitation by defining a val
outside the for
or create an Option
out of the initial assignment
2.1.2 Filter
It is possible to put if
statements after a generator to filter
values by a predicate
Older versions of Scala used filter
, but Traversable.filter
creates new
collections for every predicate, so withFilter
was introduced as the more
performant alternative. We can accidentally trigger a withFilter
by providing
type information, interpreted as a pattern match.
Like assignment, a generator can use a pattern match on the left hand side. But
unlike assignment (which throws MatchError
on failure), generators are
filtered and will not fail at runtime. However, there is an inefficient double
application of the pattern.
2.1.3 For Each
Finally, if there is no yield
, the compiler will use foreach
instead of flatMap
, which is only useful for side-effects.
2.1.4 Summary
The full set of methods supported by for
comprehensions do not share
a common super type; each generated snippet is independently compiled.
If there were a trait, it would roughly look like:
If the context (C[_]
) of a for
comprehension doesn’t provide its
own map
and flatMap
, all is not lost. If an implicit
scalaz.Bind[T]
is available for T
, it will provide map
and
flatMap
.
2.2 Unhappy path
So far we’ve only looked at the rewrite rules, not what is happening in map
and flatMap
. Consider what happens when the for
context decides that it
cannot proceed any further.
In the Option
example, the yield
is only called when i,j,k
are
all defined.
If any of a,b,c
are None
, the comprehension short-circuits with
None
but it doesn’t tell us what went wrong.
If we use Either
, then a Left
will cause the for
comprehension
to short circuit with extra information, much better than Option
for
error reporting:
And lastly, let’s see what happens with a Future
that fails:
The Future
that prints to the terminal is never called because, like
Option
and Either
, the for
comprehension short circuits.
Short circuiting for the unhappy path is a common and important theme.
for
comprehensions cannot express resource cleanup: there is no way
to try
/ finally
. This is good, in FP it puts a clear ownership of
responsibility for unexpected error recovery and resource cleanup onto
the context (which is usually a Monad
as we will see later), not the
business logic.
2.3 Gymnastics
Although it is easy to rewrite simple sequential code as a for
comprehension, sometimes we will want to do something that appears to
require mental summersaults. This section collects some practical
examples and how to deal with them.
2.3.1 Fallback Logic
Say we are calling out to a method that returns an Option
. If it is not
successful we want to fallback to another method (and so on and so on), like
when we’re using a cache:
If we have to do this for an asynchronous version of the same API
then we have to be careful not to do extra work because
will run both queries. We can pattern match on the first result but the type is wrong
We need to create a Future
from the cache
Future.successful
creates a new Future
, much like an Option
or
List
constructor.
2.3.2 Early Exit
Say we have some condition that should exit early with a successful value.
If we want to exit early with an error, it is standard practice in OOP to throw an exception
which can be rewritten async
But if we want to exit early with a successful return value, the simple synchronous code:
translates into a nested for
comprehension when our dependencies are
asynchronous:
2.4 Incomprehensible
The context we’re comprehending over must stay the same: we cannot mix contexts.
Nothing can help us mix arbitrary contexts in a for
comprehension
because the meaning is not well defined.
But when we have nested contexts the intention is usually obvious yet the compiler still doesn’t accept our code.
Here we want for
to take care of the outer context and let us write
our code on the inner Option
. Hiding the outer context is exactly
what a monad transformer does, and Scalaz provides implementations
for Option
and Either
named OptionT
and EitherT
respectively.
The outer context can be anything that normally works in a for
comprehension, but it needs to stay the same throughout.
We create an OptionT
from each method call. This changes the context
of the for
from Future[Option[_]]
to OptionT[Future, _]
.
.run
returns us to the original context
The monad transformer also allows us to mix Future[Option[_]]
calls with
methods that just return plain Future
via .liftM[OptionT]
(provided by
scalaz):
and we can mix with methods that return plain Option
by wrapping
them in Future.successful
(.pure[Future]
) followed by OptionT
It is messy again, but it is better than writing nested flatMap
and
map
by hand. We can clean it up with a DSL that handles all the
required conversions into OptionT[Future, _]
combined with the |>
operator, which applies the function on the
right to the value on the left, to visually separate the logic from
the transformers
This approach also works for Either
(and others) as the inner context, but
their lifting methods are more complex and require parameters. Scalaz provides
monad transformers for a lot of its own types, so it is worth checking if one is
available.
3. Application Design
In this chapter we will write the business logic and tests for a purely
functional server application. The source code for this application is included
under the example
directory along with the book’s source, however it is
recommended not to read the source code until the final chapter as there will be
significant refactors as we learn more about FP.
3.1 Specification
Our application will manage a just-in-time build farm on a shoestring budget. It will listen to a Drone Continuous Integration server, and spawn worker agents using Google Container Engine (GKE) to meet the demand of the work queue.
Drone receives work when a contributor submits a github pull request to a managed project. Drone assigns the work to its agents, each processing one job at a time.
The goal of our app is to ensure that there are enough agents to complete the work, with a cap on the number of agents, whilst minimising the total cost. Our app needs to know the number of items in the backlog and the number of available agents.
Google can spawn nodes, each can host multiple drone agents. When an agent starts up, it registers itself with drone and drone takes care of the lifecycle (including keep-alive calls to detect removed agents).
GKE charges a fee per minute of uptime, rounded up to the nearest hour for each node. One does not simply spawn a new node for each job in the work queue, we must re-use nodes and retain them until their 58th minute to get the most value for money.
Our app needs to be able to start and stop nodes, as well as check their status (e.g. uptimes, list of inactive nodes) and to know what time GKE believes it to be.
In addition, there is no API to talk directly to an agent so we do not know if any individual agent is performing any work for the drone server. If we accidentally stop an agent whilst it is performing work, it is inconvenient and requires a human to restart the job.
Contributors can manually add agents to the farm, so counting agents and nodes is not equivalent. We don’t need to supply any nodes if there are agents available.
The failure mode should always be to take the least costly option.
Both Drone and GKE have a JSON over REST API with OAuth 2.0 authentication.
3.2 Interfaces / Algebras
We will now codify the architecture diagram from the previous section. Firstly, we need to define a simple data type to capture a millisecond timestamp because such a simple thing does not exist in either the Java or Scala standard libraries:
In FP, an algebra takes the place of an interface
in Java, or the
set of valid messages for an Actor
in Akka. This is the layer where
we define all side-effecting interactions of our system.
There is tight iteration between writing the business logic and the algebra: it is a good level of abstraction to design a system.
We’ve used NonEmptyList
, easily created by calling .toNel
on the
stdlib’s List
(returning an Option[NonEmptyList]
), otherwise
everything should be familiar.
3.3 Business Logic
Now we write the business logic that defines the application’s behaviour, considering only the happy path.
We need a WorldView
class to hold a snapshot of our knowledge of the
world. If we were designing this application in Akka, WorldView
would probably be a var
in a stateful Actor
.
WorldView
aggregates the return values of all the methods in the
algebras, and adds a pending field to track unfulfilled requests.
Now we are ready to write our business logic, but we need to indicate
that we depend on Drone
and Machines
.
We can write the interface for the business logic
and implement it with a module. A module depends only on other modules,
algebras and pure functions, and can be abstracted over F
. If an
implementation of an algebraic interface is tied to a specific type, e.g. IO
,
it is called an interpreter.
The Monad
context bound means that F
is monadic, allowing us to use map
,
pure
and, of course, flatMap
via for
comprehensions.
We have access to the algebra of Drone
and Machines
as D
and M
,
respectively. Using a single capital letter name is a common naming convention
for monad and algebra implementations.
Our business logic will run in an infinite loop (pseudocode)
3.3.1 initial
In initial
we call all external services and aggregate their results
into a WorldView
. We default the pending
field to an empty Map
.
Recall from Chapter 1 that flatMap
(i.e. when we use the <-
generator) allows us to operate on a value that is computed at
runtime. When we return an F[_]
we are returning another program to
be interpreted at runtime, that we can then flatMap
. This is how we
safely chain together sequential side-effecting code, whilst being
able to provide a pure implementation for tests. FP could be described
as Extreme Mocking.
3.3.2 update
update
should call initial
to refresh our world view, preserving
known pending
actions.
If a node has changed state, we remove it from pending
and if a
pending action is taking longer than 10 minutes to do anything, we
assume that it failed and forget that we asked to do it.
Concrete functions like .symdiff
don’t need test interpreters, they have
explicit inputs and outputs, so we could move all pure code into standalone
methods on a stateless object
, testable in isolation. We’re happy testing only
the public methods, preferring that our business logic is easy to read.
3.3.3 act
The act
method is slightly more complex, so we will split it into two
parts for clarity: detection of when an action needs to be taken,
followed by taking action. This simplification means that we can only
perform one action per invocation, but that is reasonable because we
can control the invocations and may choose to re-run act
until no
further action is taken.
We write the scenario detectors as extractors for WorldView
, which
is nothing more than an expressive way of writing if
/ else
conditions.
We need to add agents to the farm if there is a backlog of work, we have no agents, we have no nodes alive, and there are no pending actions. We return a candidate node that we would like to start:
If there is no backlog, we should stop all nodes that have become stale (they are not doing any work). However, since Google charge per hour we only shut down machines in their 58th minute to get the most out of our money. We return the non-empty list of nodes to stop.
As a financial safety net, all nodes should have a maximum lifetime of 5 hours.
Now that we have detected the scenarios that can occur, we can write
the act
method. When we schedule a node to be started or stopped, we
add it to pending
noting the time that we scheduled the action.
Because NeedsAgent
and Stale
do not cover all possible situations,
we need a catch-all case _
to do nothing. Recall from Chapter 2 that
.pure
creates the for
’s (monadic) context from a value.
foldLeftM
is like foldLeft
, but each iteration of the fold may return a
monadic value. In our case, each iteration of the fold returns F[WorldView]
.
The M
is for Monadic. We will find more of these lifted methods that behave
as one would expect, taking monadic values in place of values.
3.4 Unit Tests
The FP approach to writing applications is a designer’s dream: delegate writing the implementations of algebras to team members while focusing on making business logic meet the requirements.
Our application is highly dependent on timing and third party webservices. If this was a traditional OOP application, we’d create mocks for all the method calls, or test actors for the outgoing mailboxes. FP mocking is equivalent to providing an alternative implementation of dependency algebras. The algebras already isolate the parts of the system that need to be mocked, i.e. interpreted differently in the unit tests.
We will start with some test data
We implement algebras by extending Drone
and Machines
with a specific
monadic context, Id
being the simplest.
Our “mock” implementations simply play back a fixed WorldView
. We’ve
isolated the state of our system, so we can use var
to store the
state:
When we write a unit test (here using FlatSpec
from Scalatest), we create an
instance of Mutable
and then import all of its members.
Our implicit drone
and machines
both use the Id
execution
context and therefore interpreting this program with them returns an
Id[WorldView]
that we can assert on.
In this trivial case we just check that the initial
method returns
the same value that we use in the static implementations:
We can create more advanced tests of the update
and act
methods,
helping us flush out bugs and refine the requirements:
It would be boring to go through the full test suite. The following tests are easy to implement using the same approach:
- not request agents when pending
- don’t shut down agents if nodes are too young
- shut down agents when there is no backlog and nodes will shortly incur new costs
- not shut down agents if there are pending actions
- shut down agents when there is no backlog if they are too old
- shut down agents, even if they are potentially doing work, if they are too old
- ignore unresponsive pending actions during update
All of these tests are synchronous and isolated to the test runner’s thread (which could be running tests in parallel). If we’d designed our test suite in Akka, our tests would be subject to arbitrary timeouts and failures would be hidden in logfiles.
The productivity boost of simple tests for business logic cannot be overstated. Consider that 90% of an application developer’s time interacting with the customer is in refining, updating and fixing these business rules. Everything else is implementation detail.
3.5 Parallel
The application that we have designed runs each of its algebraic methods sequentially. But there are some obvious places where work can be performed in parallel.
3.5.1 initial
In our definition of initial
we could ask for all the information we
need at the same time instead of one query at a time.
As opposed to flatMap
for sequential operations, Scalaz uses
Apply
syntax for parallel operations:
which can also use infix notation:
If each of the parallel operations returns a value in the same monadic
context, we can apply a function to the results when they all return.
Rewriting initial
to take advantage of this:
3.5.2 act
In the current logic for act
, we are stopping each node
sequentially, waiting for the result, and then proceeding. But we
could stop all the nodes in parallel and then update our view of the
world.
A disadvantage of doing it this way is that any failures will cause us
to short-circuit before updating the pending
field. But that is a
reasonable tradeoff since our update
will gracefully handle the case
where a node
is shut down unexpectedly.
We need a method that operates on NonEmptyList
that allows us to
map
each element into an F[MachineNode]
, returning an
F[NonEmptyList[MachineNode]]
. The method is called traverse
, and
when we flatMap
over it we get a NonEmptyList[MachineNode]
that we
can deal with in a simple way:
Arguably, this is easier to understand than the sequential version.
3.6 Summary
- algebras define the interface between systems.
- modules are implementations of an algebra in terms of other algebras.
-
interpreters are concrete implementations of an algebra for a fixed
F[_]
. - Test interpreters can replace the side-effecting parts of the system, giving a high amount of test coverage.
4. Data and Functionality
From OOP we are used to thinking about data and functionality together: class hierarchies carry methods, and traits can demand that data fields exist. Runtime polymorphism of an object is in terms of “is a” relationships, requiring classes to inherit from common interfaces. This can get messy as a codebase grows. Simple data types become obscured by hundreds of lines of methods, trait mixins suffer from initialisation order errors, and testing / mocking of highly coupled components becomes a chore.
FP takes a different approach, defining data and functionality separately. In this chapter, we will cover the basics of data types and the advantages of constraining ourselves to a subset of the Scala language. We will also discover typeclasses as a way to achieve compiletime polymorphism: thinking about functionality of a data structure in terms of “has a” rather than “is a” relationships.
4.1 Data
The fundamental building blocks of data types are
-
final case class
also known as products -
sealed abstract class
also known as coproducts -
case object
andInt
,Double
,String
(etc) values
with no methods or fields other than the constructor parameters. We prefer
abstract class
to trait
in order to get better binary compatibility and to
discourage trait mixing.
The collective name for products, coproducts and values is Algebraic Data Type (ADT).
We compose data types from the AND
and XOR
(exclusive OR
)
Boolean algebra: a product contains every type that it is composed of,
but a coproduct can be only one. For example
- product:
ABC = a AND b AND c
- coproduct:
XYZ = x XOR y XOR z
written in Scala
4.1.1 Recursive ADTs
When an ADT refers to itself, we call it a Recursive Algebraic Data Type.
scalaz.IList
, a safe alternative to the stdlib List
, is recursive because
ICons
contains a reference to IList
.:
4.1.2 Functions on ADTs
ADTs can contain pure functions
But ADTs that contain functions come with some caveats as they don’t
translate perfectly onto the JVM. For example, legacy Serializable
,
hashCode
, equals
and toString
do not behave as one might
reasonably expect.
Unfortunately, Serializable
is used by popular frameworks, despite
far superior alternatives. A common pitfall is forgetting that
Serializable
may attempt to serialise the entire closure of a
function, which can crash production servers. A similar caveat applies
to legacy Java classes such as Throwable
, which can carry references
to arbitrary objects.
We will explore alternatives to the legacy methods when we discuss the Scalaz library in the next chapter, at the cost of losing interoperability with some legacy Java and Scala code.
4.1.3 Exhaustivity
It is important that we use sealed abstract class
, not just
abstract class
, when defining a data type. Sealing a class
means
that all subtypes must be defined in the same file, allowing the
compiler to know about them in pattern match exhaustivity checks and
in macros that eliminate boilerplate. e.g.
This shows the developer what they have broken when they add a new
product to the codebase. We’re using -Xfatal-warnings
, otherwise
this is just a warning.
However, the compiler will not perform exhaustivity checking if the
class
is not sealed or if there are guards, e.g.
To remain safe, don’t use guards on sealed
types.
The -Xstrict-patmat-analysis
flag has been proposed as a language
improvement to perform additional pattern matcher checks.
4.1.4 Alternative Products and Coproducts
Another form of product is a tuple, which is like an unlabelled final
case class
.
(A.type, B, C)
is equivalent to ABC
in the above example but it is best to
use final case class
when part of an ADT because the lack of names is awkward
to deal with, and case class
has much better performance for primitive values.
Another form of coproduct is when we nest Either
types. e.g.
equivalent to the XYZ
sealed abstract class. A cleaner syntax to define
nested Either
types is to create an alias type ending with a colon,
allowing infix notation with association from the right:
This is useful to create anonymous coproducts when we cannot put all the implementations into the same source file.
Yet another alternative coproduct is to create a custom sealed abstract class
with final case class
definitions that simply wrap the desired type:
Pattern matching on these forms of coproduct can be tedious, which is why Union Types are being explored in the Dotty next-generation Scala compiler. Macros such as totalitarian and iotaz exist as alternative ways of encoding anonymous coproducts.
4.1.5 Convey Information
Besides being a container for necessary business information, data types can be used to encode constraints. For example,
can never be empty. This makes scalaz.NonEmptyList
a useful data type despite
containing the same information as IList
.
Product types often contain types that are far more general than is allowed. In traditional OOP this would be handled with input validation through assertions:
Instead, we can use the Either
data type to provide Right[Person]
for valid
instances and protect invalid instances from propagating. Note that the
constructor is private
:
4.1.5.1 Refined Data Types
A clean way to restrict the values of a general type is with the refined
library, providing a suite of restrictions to the contents of data. To install
refined, add the following to build.sbt
and the following imports
Refined
allows us to define Person
using adhoc refined types to capture
requirements exactly, written A Refined B
.
The underlying value can be obtained with .value
. We can construct a
value at runtime using .refineV
, returning an Either
If we add the following import
we can construct valid values at compiletime and get an error if the provided value does not meet the requirements
More complex requirements can be captured, for example we can use the built-in
rule MaxSize
with the following imports
capturing the requirement that the String
must be both non-empty and have a
maximum size of 10 characters:
It is easy to define custom requirements that are not covered by the refined
library. For example in drone-dynamaic-agents
we will need a way of ensuring
that a String
contains application/x-www-form-urlencoded
content. We can
create a Refined
rule using the Java regular expression library:
4.1.6 Simple to Share
By not providing any functionality, ADTs can have a minimal set of dependencies. This makes them easy to publish and share with other developers. By using a simple data modelling language, it makes it possible to interact with cross-discipline teams, such as DBAs, UI developers and business analysts, using the actual code instead of a hand written document as the source of truth.
Furthermore, tooling can be more easily written to produce or consume schemas from other programming languages and wire protocols.
4.1.7 Counting Complexity
The complexity of a data type is the count of values that can exist. A good data type has the least amount of complexity it needs to hold the information it conveys, and no more.
Values have a built-in complexity:
-
Unit
has one value (why it is called “unit”) -
Boolean
has two values -
Int
has 4,294,967,295 values -
String
has effectively infinite values
To find the complexity of a product, we multiply the complexity of each part.
-
(Boolean, Boolean)
has 4 values (2*2
) -
(Boolean, Boolean, Boolean)
has 8 values (2*2*2
)
To find the complexity of a coproduct, we add the complexity of each part.
-
(Boolean |: Boolean)
has 4 values (2+2
) -
(Boolean |: Boolean |: Boolean)
has 6 values (2+2+2
)
To find the complexity of a ADT with a type parameter, multiply each part by the complexity of the type parameter:
-
Option[Boolean]
has 3 values,Some[Boolean]
andNone
(2+1
)
In FP, functions are total and must return an value for every
input, no Exception
. Minimising the complexity of inputs and outputs
is the best way to achieve totality. As a rule of thumb, it is a sign
of a badly designed function when the complexity of a function’s
return value is larger than the product of its inputs: it is a source
of entropy.
The complexity of a total function is the number of possible functions that can satisfy the type signature: the output to the power of the input.
-
Unit => Boolean
has complexity 2 -
Boolean => Boolean
has complexity 4 -
Option[Boolean] => Option[Boolean]
has complexity 27 -
Boolean => Int
is a mere quintillion going on a sextillion. -
Int => Boolean
is so big that if all implementations were assigned a unique number, each would require 4 gigabytes to represent.
In reality, Int => Boolean
will be something simple like isOdd
, isEven
or
a sparse BitSet
. This function, when used in an ADT, could be better replaced
with a coproduct labelling the limited set of functions that are relevant.
When our complexity is “infinity in, infinity out” we should introduce
restrictive data types and validation closer to the point of input with
Refined
from the previous section.
The ability to count the complexity of a type signature has one other practical application: we can find simpler type signatures with High School algebra! To go from a type signature to its algebra of complexity, simply replace
-
Either[A, B]
witha + b
-
(A, B)
witha * b
-
A => B
withb ^ a
do some rearranging, and convert back. For example, say we’ve designed a framework based on callbacks and we’ve managed to work ourselves into the situation where we have created this type signature:
We can convert and rearrange
then convert back to types and get
which is much simpler: we only need to ask the users of our framework to provide
a Either[A, B] => C
.
The same line of reasoning can be used to prove that
is equivalent to
also known as Currying.
4.1.8 Prefer Coproduct over Product
An archetypal modelling problem that comes up a lot is when there are
mutually exclusive configuration parameters a
, b
and c
. The
product (a: Boolean, b: Boolean, c: Boolean)
has complexity 8
whereas the coproduct
has a complexity of 3. It is better to model these configuration parameters as a coproduct rather than allowing 5 invalid states to exist.
The complexity of a data type also has implications on testing. It is practically impossible to test every possible input to a function, but it is easy to test a sample of values with the Scalacheck property testing framework. If a random sample of a data type has a low probability of being valid, it is a sign that the data is modelled incorrectly.
4.1.9 Optimisations
A big advantage of using a simplified subset of the Scala language to represent data types is that tooling can optimise the JVM bytecode representation.
For example, we could pack Boolean
and Option
fields into an Array[Byte]
,
cache values, memoise hashCode
, optimise equals
, use @switch
statements
when pattern matching, and much more.
These optimisations are not applicable to OOP class
hierarchies that
may be managing state, throwing exceptions, or providing adhoc method
implementations.
4.2 Functionality
Pure functions are typically defined as methods on an object
.
However, it can be clunky to use object
methods since it reads
inside-out, not left to right. In addition, a function on an object
steals the namespace. If we were to define sin(t: T)
somewhere else
we get ambiguous reference errors. This is the same problem as
Java’s static methods vs class methods.
With the implicit class
language feature (also known as extension
methodology or syntax), and a little boilerplate, we can get the
familiar style:
Often it is best to just skip the object
definition and go straight
for an implicit class
, keeping boilerplate to a minimum:
4.2.1 Polymorphic Functions
The more common kind of function is a polymorphic function, which lives in a typeclass. A typeclass is a trait that:
- holds no state
- has a type parameter
- has at least one abstract method (primitive combinators)
- may contain generalised methods (derived combinators)
- may extend other typeclasses
There can only be one implementation of a typeclass for any given type parameter, a property known as typeclass coherence. Typeclasses look superficially similar to algebraic interfaces from the previous chapter, but algebras do not have to be coherent.
Typeclasses are used in the Scala stdlib. We will explore a simplified
version of scala.math.Numeric
to demonstrate the principle:
We can see all the key features of a typeclass in action:
- there is no state
-
Ordering
andNumeric
have type parameterT
-
Ordering
has abstractcompare
andNumeric
has abstractplus
,times
,negate
andzero
-
Ordering
defines generalisedlt
andgt
based oncompare
,Numeric
definesabs
in terms oflt
,negate
andzero
. -
Numeric
extendsOrdering
We can now write functions for types that “have a” Numeric
typeclass:
We are no longer dependent on the OOP hierarchy of our input types,
i.e. we don’t demand that our input “is a” Numeric
, which is vitally
important if we want to support a third party class that we cannot
redefine.
Another advantage of typeclasses is that the association of functionality to data is at compiletime, as opposed to OOP runtime dynamic dispatch.
For example, whereas the List
class can only have one implementation
of a method, a typeclass method allows us to have a different
implementation depending on the List
contents and therefore offload
work to compiletime instead of leaving it to runtime.
4.2.2 Syntax
The syntax for writing signOfTheTimes
is clunky, there are some
things we can do to clean it up.
Downstream users will prefer to see our method use context bounds,
since the signature reads cleanly as “takes a T
that has a
Numeric
”
but now we have to use implicitly[Numeric[T]]
everywhere. By
defining boilerplate on the companion of the typeclass
we can obtain the implicit with less noise
But it is still worse for us as the implementors. We have the
syntactic problem of inside-out static methods vs class methods. We
deal with this by introducing ops
on the typeclass companion:
Note that -x
is expanded into x.unary_-
by the compiler’s syntax
sugar, which is why we define unary_-
as an extension method. We can
now write the much cleaner:
The good news is that we never need to write this boilerplate because
Simulacrum provides a @typeclass
macro annotation that automatically generates the apply
and ops
. It even
allows us to define alternative (usually symbolic) names for common methods. In
full:
When there is a custom symbolic @op
, it can be pronounced like its method
name. e.g. <
is pronounced “less than”, not “left angle bracket”.
4.2.3 Instances
Instances of Numeric
(which are also instances of Ordering
) are
defined as an implicit val
that extends the typeclass, and can
provide optimised implementations for the generalised methods:
Although we are using +
, *
, unary_-
, <
and >
here, which are
the ops (and could be an infinite loop!), these methods exist already
on Double
. Class methods are always used in preference to extension
methods. Indeed, the Scala compiler performs special handling of
primitives and converts these method calls into raw dadd
, dmul
,
dcmpl
and dcmpg
bytecode instructions, respectively.
We can also implement Numeric
for Java’s BigDecimal
class (avoid
scala.BigDecimal
, it is fundamentally broken)
We could create our own data structure for complex numbers:
And derive a Numeric[Complex[T]]
if Numeric[T]
exists. Since these
instances depend on the type parameter, it is a def
, not a val
.
The observant reader may notice that abs
is not at all what a
mathematician would expect. The correct return value for abs
should
be T
, not Complex[T]
.
scala.math.Numeric
tries to do too much and does not generalise
beyond real numbers. This is a good lesson that smaller, well defined,
typeclasses are often better than a monolithic collection of overly
specific features.
4.2.4 Implicit Resolution
We’ve discussed implicits a lot: this section is to clarify what implicits are and how they work.
Implicit parameters are when a method requests that a unique instance of a particular type is in the implicit scope of the caller, with special syntax for typeclass instances. Implicit parameters are a clean way to thread configuration through an application.
In this example, foo
requires that typeclass instances of Numeric
and
Typeable
are available for A
, as well as an implicit Handler
object that
takes two type parameters
Implicit conversion is when an implicit def
exists. One such use
of implicit conversions is to enable extension methodology. When the
compiler is resolving a call to a method, it first checks if the
method exists on the type, then its ancestors (Java-like rules). If it
fails to find a match, it will search the implicit scope for
conversions to other types, then search for methods on those types.
Another use for implicit conversions is typeclass derivation. In the
previous section we wrote an implicit def
that derived a
Numeric[Complex[T]]
if a Numeric[T]
is in the implicit scope. It
is possible to chain together many implicit def
(including
recursively) which is the basis of typeful programming, allowing for
computations to be performed at compiletime rather than runtime.
The glue that combines implicit parameters (receivers) with implicit conversion (providers) is implicit resolution.
First, the normal variable scope is searched for implicits, in order:
- local scope, including scoped imports (e.g. the block or method)
- outer scope, including scoped imports (e.g. members in the class)
- ancestors (e.g. members in the super class)
- the current package object
- ancestor package objects (when using nested packages)
- the file’s imports
If that fails to find a match, the special scope is searched, which looks for implicit instances inside a type’s companion, its package object, outer objects (if nested), and then repeated for ancestors. This is performed, in order, for the:
- given parameter type
- expected parameter type
- type parameter (if there is one)
If two matching implicits are found in the same phase of implicit resolution, an ambiguous implicit error is raised.
Implicits are often defined on a trait
, which is then extended by an
object. This is to try and control the priority of an implicit
relative to another more specific one, to avoid ambiguous implicits.
The Scala Language Specification is rather vague for corner cases, and
the compiler implementation is the de facto standard. There are some
rules of thumb that we will use throughout this book, e.g. prefer
implicit val
over implicit object
despite the temptation of less
typing. It is a quirk of implicit resolution that implicit object
on
companion objects are not treated the same as implicit val
.
Implicit resolution falls short when there is a hierarchy of typeclasses, like
Ordering
and Numeric
. If we write a function that takes an implicit
Ordering
, and we call it for a primitive type which has an instance of
Numeric
defined on the Numeric
companion, the compiler will fail to find it.
Implicit resolution is particularly hit-or-miss if type aliases are used where
the shape of the implicit parameters are changed. For example an implicit
parameter using an alias such as type Values[A] = List[Option[A]]
will
probably fail to find implicits defined as raw List[Option[A]]
because the
shape is changed from a thing of things of A
to a thing of A
.
4.3 Modelling OAuth2
We will finish this chapter with a practical example of data modelling and typeclass derivation, combined with algebra / module design from the previous chapter.
In our drone-dynamic-agents
application, we must communicate with Drone and
Google Cloud using JSON over REST. Both services use OAuth2 for authentication.
There are many ways to interpret OAuth2, but we will focus on the version that
works for Google Cloud (the Drone version is even simpler).
4.3.1 Description
Every Google Cloud application needs to have an OAuth 2.0 Client Key set up at
Obtaining a Client ID and a Client secret.
The application can then obtain a one time code by making the user perform an Authorization Request in their browser (yes, really, in their browser). We need to make this page open in the browser:
The code is delivered to the {CALLBACK_URI}
in a GET
request. To
capture it in our application, we need to have a web server listening
on localhost
.
Once we have the code, we can perform an Access Token Request:
which gives a JSON response payload
Bearer tokens typically expire after an hour, and can be refreshed by sending an HTTP request with any valid refresh token:
responding with
All userland requests to the server should include the header
after substituting the actual BEARER_TOKEN
.
Google expires all but the most recent 50 bearer tokens, so the expiry times are just guidance. The refresh tokens persist between sessions and can be expired manually by the user. We can therefore have a one-time setup application to obtain the refresh token and then include the refresh token as configuration for the user’s install of the headless server.
Drone doesn’t implement the /auth
endpoint, or the refresh, and simply
provides a BEARER_TOKEN
through their user interface.
4.3.2 Data
The first step is to model the data needed for OAuth2. We create an ADT with
fields having exactly the same name as required by the OAuth2 server. We will
use String
and Long
for brevity, but we could use refined types if they leak
into our business models.
4.3.3 Functionality
We need to marshal the data classes we defined in the previous section into JSON, URLs and POST-encoded forms. Since this requires polymorphism, we will need typeclasses.
jsonformat
is a simple JSON library that we will study in more detail in a
later chapter, as it has been written with principled FP and ease of readability
as its primary design objectives. It consists of a JSON AST and encoder /
decoder typeclasses:
We need instances of JsDecoder[AccessResponse]
and JsDecoder[RefreshResponse]
.
We can do this by making use of a helper function:
We put the instances on the companions of our data types, so that they are always in the implicit scope:
We can then parse a string into an AccessResponse
or a RefreshResponse
We need to write our own typeclasses for URL and POST encoding. The following is a reasonable design:
We need to provide typeclass instances for basic types:
We use Refined.unsafeApply
when we can logically deduce that the contents of
the string are already url encoded, bypassing any further checks.
ilist
is an example of simple typeclass derivation, much as we derived
Numeric[Complex]
from the underlying numeric representation. The
.intercalate
method is like .mkString
but more general.
In a dedicated chapter on Typeclass Derivation we will calculate instances of
UrlQueryWriter
automatically, as well as clean up what
we have already written, but for now we will write the boilerplate for the types
we wish to convert:
4.3.4 Module
That concludes the data and functionality modelling required to implement OAuth2. Recall from the previous chapter that we define components that need to interact with the world as algebras, and we define business logic in a module, so it can be thoroughly tested.
We define our dependency algebras, and use context bounds to show that our
responses must have a JsDecoder
and our POST
payload must have a
UrlEncodedWriter
:
Note that we only define the happy path in the JsonClient
API. We will get
around to error handling in a later chapter.
Obtaining a CodeToken
from the Google OAuth2
server involves
- starting an HTTP server on the local machine, and obtaining its port number.
- making the user open a web page in their browser, which allows them to log in with their Google credentials and authorise the application, with a redirect back to the local machine.
- capturing the code, informing the user of next steps, and closing the HTTP server.
We can model this with three methods on a UserInteraction
algebra.
It almost sounds easy when put like that.
We also need an algebra to abstract over the local system time
And introduce data types that we will use in the refresh logic
Now we can write an OAuth2 client module:
4.4 Summary
-
algebraic data types (ADTs) are defined as products (
final case class
) and coproducts (sealed abstract class
). -
Refined
types enforce constraints on values. - concrete functions can be defined in an
implicit class
to maintain left-to-right flow. - polymorphic functions are defined in typeclasses. Functionality is provided via “has a” context bounds, rather than “is a” class hierarchies.
- typeclass instances are implementations of a typeclass.
-
@simulacrum.typeclass
generates.ops
on the companion, providing convenient syntax for typeclass functions. - typeclass derivation is compiletime composition of typeclass instances.
5. Scalaz Typeclasses
In this chapter we will tour most of the typeclasses in scalaz-core
.
We don’t use everything in drone-dynamic-agents
so we will give
standalone examples when appropriate.
There has been criticism of the naming in Scalaz, and functional programming in
general. Most names follow the conventions introduced in the Haskell programming
language, based on Category Theory. Feel free to set up type
aliases if
verbs based on the primary functionality are easier to remember when learning
(e.g. Mappable
, Pureable
, FlatMappable
).
Before we introduce the typeclass hierarchy, we will peek at the four most important methods from a control flow perspective: the methods we will use the most in typical FP applications:
Typeclass | Method | From | Given | To |
---|---|---|---|---|
Functor |
map |
F[A] |
A => B |
F[B] |
Applicative |
pure |
A |
F[A] |
|
Monad |
flatMap |
F[A] |
A => F[B] |
F[B] |
Traverse |
sequence |
F[G[A]] |
G[F[A]] |
We know that operations which return a F[_]
can be run sequentially
in a for
comprehension by .flatMap
, defined on its Monad[F]
. The
context F[_]
can be thought of as a container for an intentional
effect with A
as the output: flatMap
allows us to generate new
effects F[B]
at runtime based on the results of evaluating previous
effects.
Of course, not all type constructors F[_]
are effectful, even if
they have a Monad[F]
. Often they are data structures. By using the
least specific abstraction, we can reuse code for List
, Either
,
Future
and more.
If we only need to transform the output from an F[_]
, that is just
map
, introduced by Functor
. In Chapter 3, we ran effects in
parallel by creating a product and mapping over them. In Functional
Programming, parallelisable computations are considered less
powerful than sequential ones.
In between Monad
and Functor
is Applicative
, defining pure
that lets us lift a value into an effect, or create a data structure
from a single value.
.sequence
is useful for rearranging type constructors. If we have an F[G[_]]
but need a G[F[_]]
, e.g. List[Future[Int]]
but need a Future[List[Int]]
,
that is .sequence
.
5.1 Agenda
This chapter is longer than usual and jam-packed with information: it is perfectly reasonable to attack it over several sittings. Remembering everything would require super-human powers, so treat this chapter as a way of knowing where to look for more information.
Notably absent are typeclasses that extend Monad
. They get their own chapter
later.
Scalaz uses code generation, not simulacrum. However, for brevity, we present
code snippets with @typeclass
. Equivalent syntax is available when we import
scalaz._, Scalaz._
and is available under the scalaz.syntax
package in the
scalaz source code.
5.2 Appendable Things
A Semigroup
can be defined for a type if two values can be combined. The
operation must be associative, meaning that the order of nested operations
should not matter, i.e.
A Monoid
is a Semigroup
with a zero element (also called empty
or identity). Combining zero
with any other a
should give a
.
This is probably bringing back memories of Numeric
from Chapter 4. There are
implementations of Monoid
for all the primitive numbers, but the concept of
appendable things is useful beyond numbers.
Band
has the law that the append
operation of the same two
elements is idempotent, i.e. gives the same value. Examples are
anything that can only be one value, such as Unit
, least upper
bounds, or a Set
. Band
provides no further methods yet users can
make use of the guarantees for performance optimisation.
As a realistic example for Monoid
, consider a trading system that has a large
database of reusable trade templates. Populating the default values for a new
trade involves selecting and combining multiple templates, with a “last rule
wins” merge policy if two templates provide a value for the same field. The
“selecting” work is already done for us by another system, it is our job to
combine the templates in order.
We will create a simple template schema to demonstrate the principle, but keep in mind that a realistic system would have a more complicated ADT.
If we write a method that takes templates: List[TradeTemplate]
, we
only need to call
and our job is done!
But to get zero
or call |+|
we must have an instance of
Monoid[TradeTemplate]
. Although we will generically derive this in a
later chapter, for now we will create an instance on the companion:
However, this doesn’t do what we want because Monoid[Option[A]]
will append
its contents, e.g.
whereas we want “last rule wins”. We can override the default
Monoid[Option[A]]
with our own:
Now everything compiles, let’s try it out…
All we needed to do was implement one piece of business logic and
Monoid
took care of everything else for us!
Note that the list of payments
are concatenated. This is because the
default Monoid[List]
uses concatenation of elements and happens to
be the desired behaviour. If the business requirement was different,
it would be a simple case of providing a custom
Monoid[List[LocalDate]]
. Recall from Chapter 4 that with compiletime
polymorphism we can have a different implementation of append
depending on the E
in List[E]
, not just the base runtime class
List
.
5.3 Objecty Things
In the chapter on Data and Functionality we said that the JVM’s notion
of equality breaks down for many things that we can put into an ADT.
The problem is that the JVM was designed for Java, and equals
is
defined on java.lang.Object
whether it makes sense or not. There is
no way to remove equals
and no way to guarantee that it is
implemented.
However, in FP we prefer typeclasses for polymorphic functionality and even the concept of equality is captured at compiletime.
Indeed ===
(triple equals) is more typesafe than ==
(double
equals) because it can only be compiled when the types are the same
on both sides of the comparison. This catches a lot of bugs.
equal
has the same implementation requirements as Object.equals
-
commutative
f1 === f2
impliesf2 === f1
-
reflexive
f === f
-
transitive
f1 === f2 && f2 === f3
impliesf1 === f3
By throwing away the universal concept of Object.equals
we don’t
take equality for granted when we construct an ADT, stopping us at
compiletime from expecting equality when there is none.
Continuing the trend of replacing old Java concepts, rather than data
being a java.lang.Comparable
, they now have an Order
according
to:
Order
implements .equal
in terms of the new primitive .order
. When a
typeclass implements a parent’s primitive combinator with a derived
combinator, an implied law of substitution for the typeclass is added. If an
instance of Order
were to override .equal
for performance reasons, it must
behave identically the same as the original.
Things that have an order may also be discrete, allowing us to walk successors and predecessors:
We will discuss EphemeralStream
in the next chapter, for now we just need to
know that it is a potentially infinite data structure that avoids the memory
retention problems in the stdlib Stream
.
Similarly to Object.equals
, the concept of .toString
on every class
does
not make sense in Java. We would like to enforce stringyness at compiletime and
this is exactly what Show
achieves:
We will explore Cord
in more detail in the chapter on data types, we need only
know that it is an efficient data structure for storing and manipulating
String
.
5.4 Mappable Things
We’re focusing on things that can be mapped over, or traversed, in some sense:
5.4.1 Functor
The only abstract method is map
, and it must compose, i.e. mapping
with f
and then again with g
is the same as mapping once with the
composition of f
and g
:
The map
should also perform a no-op if the provided function is
identity
(i.e. x => x
)
Functor
defines some convenience methods around map
that can be optimised by
specific instances. The documentation has been intentionally omitted in the
above definitions to encourage guessing what a method does before looking at the
implementation. Please spend a moment studying only the type signature of the
following before reading further:
-
void
takes an instance of theF[A]
and always returns anF[Unit]
, it forgets all the values whilst preserving the structure. -
fproduct
takes the same input asmap
but returnsF[(A, B)]
, i.e. it tuples the contents with the result of applying the function. This is useful when we wish to retain the input. -
fpair
twins all the elements ofA
into a tupleF[(A, A)]
-
strengthL
pairs the contents of anF[B]
with a constantA
on the left. -
strengthR
pairs the contents of anF[A]
with a constantB
on the right. -
lift
takes a functionA => B
and returns aF[A] => F[B]
. In other words, it takes a function over the contents of anF[A]
and returns a function that operates on theF[A]
directly. -
mapply
is a mind bender. Say we have anF[_]
of functionsA => B
and a valueA
, then we can get anF[B]
. It has a similar signature topure
but requires the caller to provide theF[A => B]
.
fpair
, strengthL
and strengthR
look pretty useless, but they are
useful when we wish to retain some information that would otherwise be
lost to scope.
Functor
has some special syntax:
.as
and >|
are a way of replacing the output with a constant.
In our example application, as a nasty hack (which we didn’t even
admit to until now), we defined start
and stop
to return their
input:
This allowed us to write terse business logic such as
and
But this hack pushes unnecessary complexity into the implementations. It is
better if we let our algebras return F[Unit]
and use as
:
and
5.4.2 Foldable
Technically, Foldable
is for data structures that can be walked to produce a
summary value. However, this undersells the fact that it is a one-typeclass army
that can provide most of what we would expect to see in a Collections API.
There are so many methods we are going to have to split them out, beginning with the abstract methods:
An instance of Foldable
need only implement foldMap
and
foldRight
to get all of the functionality in this typeclass,
although methods are typically optimised for specific data structures.
.foldMap
has a marketing buzzword name: MapReduce. Given an F[A]
, a
function from A
to B
, and a way to combine B
(provided by the Monoid
,
along with a zero B
), we can produce a summary value of type B
. There is no
enforced operation order, allowing for parallel computation.
foldRight
does not require its parameters to have a Monoid
,
meaning that it needs a starting value z
and a way to combine each
element of the data structure with the summary value. The order for
traversing the elements is from right to left and therefore it cannot
be parallelised.
foldLeft
traverses elements from left to right. foldLeft
can be
implemented in terms of foldMap
, but most instances choose to
implement it because it is such a basic operation. Since it is usually
implemented with tail recursion, there are no byname parameters.
The only law for Foldable
is that foldLeft
and foldRight
should
each be consistent with foldMap
for monoidal operations. e.g.
appending an element to a list for foldLeft
and prepending an
element to a list for foldRight
. However, foldLeft
and foldRight
do not need to be consistent with each other: in fact they often
produce the reverse of each other.
The simplest thing to do with foldMap
is to use the identity
function, giving fold
(the natural sum of the monoidal elements),
with left/right variants to allow choosing based on performance
criteria:
Recall that when we learnt about Monoid
, we wrote this:
We now know this is silly and we should have written:
.fold
doesn’t work on stdlib List
because it already has a method
called fold
that does it is own thing in its own special way.
The strangely named intercalate
inserts a specific A
between each
element before performing the fold
which is a generalised version of the stdlib’s mkString
:
The foldLeft
provides the means to obtain any element by traversal
index, including a bunch of other related methods:
Scalaz is a pure library of only total functions. Whereas List(0)
can throw
an exception, Foldable.index
returns an Option[A]
with the convenient
.indexOr
returning an A
when a default value is provided. .element
is
similar to the stdlib .contains
but uses Equal
rather than ill-defined JVM
equality.
These methods really sound like a collections API. And, of course,
anything with a Foldable
can be converted into a List
There are also conversions to other stdlib and Scalaz data types such
as .toSet
, .toVector
, .toStream
, .to[T <: TraversableLike]
,
.toIList
and so on.
There are useful predicate checks
filterLength
is a way of counting how many elements are true
for a
predicate, all
and any
return true
if all (or any) element meets
the predicate, and may exit early.
We can split an F[A]
into parts that result in the same B
with
splitBy
for example
noting that there are two values indexed by 'b'
.
splitByRelation
avoids the need for an Equal
but we must provide
the comparison operator.
splitWith
splits the elements into groups that alternatively satisfy
and don’t satisfy the predicate. selectSplit
selects groups of
elements that satisfy the predicate, discarding others. This is one of
those rare occasions when two methods share the same type signature
but have different meanings.
findLeft
and findRight
are for extracting the first element (from
the left, or right, respectively) that matches a predicate.
Making further use of Equal
and Order
, we have the distinct
methods which return groupings.
distinct
is implemented more efficiently than distinctE
because it
can make use of ordering and therefore use a quicksort-esque algorithm
that is much faster than the stdlib’s naive List.distinct
. Data
structures (such as sets) can implement distinct
in their Foldable
without doing any work.
distinctBy
allows grouping by the result of applying a function to
the elements. For example, grouping names by their first letter.
We can make further use of Order
by extracting the minimum or
maximum element (or both extrema) including variations using the Of
or By
pattern to first map to another type or to use a different
type to do the order comparison.
For example we can ask which String
is maximum By
length, or what
is the maximum length Of
the elements.
This concludes the key features of Foldable
. The takeaway is that anything
we’d expect to find in a collection library is probably on Foldable
and if it
isn’t already, it probably should be.
We will conclude with some variations of the methods we’ve already seen.
First there are methods that take a Semigroup
instead of a Monoid
:
returning Option
to account for empty data structures (recall that
Semigroup
does not have a zero
).
The typeclass Foldable1
contains a lot more Semigroup
variants of
the Monoid
methods shown here (all suffixed 1
) and makes sense for
data structures which are never empty, without requiring a Monoid
on
the elements.
Importantly, there are variants that take monadic return values. We already used
foldLeftM
when we first wrote the business logic of our application, now we
know that it is from Foldable
:
5.4.3 Traverse
Traverse
is what happens when we cross a Functor
with a Foldable
At the beginning of the chapter we showed the importance of traverse
and sequence
for swapping around type constructors to fit a
requirement (e.g. List[Future[_]]
to Future[List[_]]
).
In Foldable
we weren’t able to assume that reverse
was a universal
concept, but now we can reverse a thing.
We can also zip
together two things that have a Traverse
, getting
back None
when one side runs out of elements, using zipL
or zipR
to decide which side to truncate when the lengths don’t match. A
special case of zip
is to add an index to every entry with
indexed
.
zipWithL
and zipWithR
allow combining the two sides of a zip
into a new type, and then returning just an F[C]
.
mapAccumL
and mapAccumR
are regular map
combined with an accumulator. If
we find our old Java ways make us want to reach for a var
, and refer to it
from a map
, we should be using mapAccumL
.
For example, let’s say we have a list of words and we want to blank out words we’ve already seen. The filtering algorithm is not allowed to process the list of words a second time so it can be scaled to an infinite stream:
Finally Traverse1
, like Foldable1
, provides variants of these methods for
data structures that cannot be empty, accepting the weaker Semigroup
instead
of a Monoid
, and an Apply
instead of an Applicative
. Recall that
Semigroup
does not have to provide an .empty
, and Apply
does not have to
provide a .point
.
5.4.4 Align
Align
is about merging and padding anything with a Functor
. Before
looking at Align
, meet the \&/
data type (spoken as These, or
hurray!).
i.e. it is a data encoding of inclusive logical OR
. A
or B
or both A
and
B
.
alignWith
takes a function from either an A
or a B
(or both) to
a C
and returns a lifted function from a tuple of F[A]
and F[B]
to an F[C]
. align
constructs a \&/
out of two F[_]
.
merge
allows us to combine two F[A]
when A
has a Semigroup
. For example,
the implementation of Semigroup[Map[K, V]]
defers to Semigroup[V]
, combining
two entries results in combining their values, having the consequence that
Map[K, List[A]]
behaves like a multimap:
and a Map[K, Int]
simply tally their contents when merging:
.pad
and .padWith
are for partially merging two data structures that might
be missing values on one side. For example if we wanted to aggregate independent
votes and retain the knowledge of where the votes came from
There are convenient variants of align
that make use of the
structure of \&/
which should make sense from their type signatures. Examples:
Note that the A
and B
variants use inclusive OR
, whereas the
This
and That
variants are exclusive, returning None
if there is
a value in both sides, or no value on either side.
5.5 Variance
We must return to Functor
for a moment and discuss an ancestor that
we previously ignored:
InvariantFunctor
, also known as the exponential functor, has a
method xmap
which says that given a function from A
to B
, and a
function from B
to A
, then we can convert F[A]
to F[B]
.
Functor
is a short name for what should be covariant functor. But
since Functor
is so popular it gets the nickname. Likewise
Contravariant
should really be contravariant functor.
Functor
implements xmap
with map
and ignores the function from
B
to A
. Contravariant
, on the other hand, implements xmap
with
contramap
and ignores the function from A
to B
:
It is important to note that, although related at a theoretical level,
the words covariant, contravariant and invariant do not directly
refer to Scala type variance (i.e. +
and -
prefixes that may be
written in type signatures). Invariance here means that it is
possible to map the contents of a structure F[A]
into F[B]
. Using
identity
we can see that A
can be safely downcast (or upcast) into
B
depending on the variance of the functor.
.map
may be understand by its contract “if you give me an F
of A
and a way
to turn an A
into a B
, then I can give you an F
of B
”.
Likewise, .contramap
reads as “if you give me an F
of A
and a way to turn
a B
into a A
, then I can give you an F
of B
”.
We will consider an example: in our application we introduce domain specific
types Alpha
, Beta
, Gamma
, etc, to ensure that we don’t mix up numbers in a
financial calculation:
but now we’re faced with the problem that we don’t have any typeclasses for
these new types. If we use the values in JSON documents, we have to write
instances of JsEncoder
and JsDecoder
.
However, JsEncoder
has a Contravariant
and JsDecoder
has a Functor
, so
we can derive instances. Filling in the contract:
- “if you give me a
JsDecoder
for aDouble
, and a way to go from aDouble
to anAlpha
, then I can give you aJsDecoder
for anAlpha
”. - “if you give me a
JsEncoder
for aDouble
, and a way to go from anAlpha
to aDouble
, then I can give you aJsEncoder
for anAlpha
”.
Methods on a typeclass can have their type parameters in contravariant
position (method parameters) or in covariant position (return type). If a
typeclass has a combination of covariant and contravariant positions, it might
have an invariant functor. For example, Semigroup
and Monoid
have an
InvariantFunctor
, but not a Functor
or a Contravariant
.
5.6 Apply and Bind
Consider this the warm-up act to Applicative
and Monad
5.6.1 Apply
Apply
extends Functor
by adding a method named ap
which is
similar to map
in that it applies a function to values. However,
with ap
, the function is in the same context as the values.
It is worth taking a moment to consider what that means for a simple data
structure like Option[A]
, having the following implementation of .ap
To implement .ap
, we must first extract the function ff: A => B
from f:
Option[A => B]
, then we can map over fa
. The extraction of the function from
the context is the important power that Apply
brings, allowing multiple
function to be combined inside the context.
Returning to Apply
, we find .applyX
boilerplate that allows us to combine
parallel functions and then map over their combined output:
Read .apply2
as a contract promising: “if you give me an F
of A
and an F
of B
, with a way of combining A
and B
into a C
, then I can give you an
F
of C
”. There are many uses for this contract and the two most important are:
- constructing some typeclasses for a product type
C
from its constituentsA
andB
- performing effects in parallel, like the drone and google algebras we created in Chapter 3, and then combining their results.
Indeed, Apply
is so useful that it has special syntax:
which is exactly what we used in Chapter 3:
The syntax <*
and *>
(left bird and right bird) offer a convenient way to
ignore the output from one of two parallel effects.
Unfortunately, although the |@|
syntax is clear, there is a problem
in that a new ApplicativeBuilder
object is allocated for each
additional effect. If the work is I/O-bound, the memory allocation
cost is insignificant. However, when performing CPU-bound work, use
the alternative lifting with arity syntax, which does not produce
any intermediate objects:
used like
or directly call applyX
Despite being more commonly used with effects, Apply
works just as well with
data structures. Consider rewriting
as
If we only want the combined output as a tuple, methods exist to do just that:
There are also the generalised versions of ap
for more than two
parameters:
along with .lift
methods that take normal functions and lift them into the
F[_]
context, the generalisation of Functor.lift
and .apF
, a partially applied syntax for ap
Finally .forever
repeating an effect without stopping. The instance of Apply
must be
stack safe or we will get StackOverflowError
.
5.6.2 Bind
Bind
introduces .bind
, synonymous with .flatMap
, which allows functions
over the result of an effect to return a new effect, or for functions over the
values of a data structure to return new data structures that are then joined.
The .join
may be familiar to users of .flatten
in the stdlib, it takes a
nested context and squashes it into one.
Derived combinators are introduced for .ap
and .apply2
that require
consistency with .bind
. We will see later that this law has consequences for
parallelisation strategies.
mproduct
is like Functor.fproduct
and pairs the function’s input
with its output, inside the F
.
ifM
is a way to construct a conditional data structure or effect:
ifM
and ap
are optimised to cache and reuse code branches, compare
to the longer form
which produces a fresh List(0)
or List(1, 1)
every time the branch
is invoked.
Bind
also has some special syntax
>>
is when we wish to discard the input to bind
and >>!
is when
we want to run an effect but discard its output.
5.7 Applicative and Monad
From a functionality point of view, Applicative
is Apply
with a
pure
method, and Monad
extends Applicative
with Bind
.
In many ways, Applicative
and Monad
are the culmination of everything we’ve
seen in this chapter. .pure
(or .point
as it is more commonly known for data
structures) allows us to create effects or data structures from values.
Instances of Applicative
must meet some laws, effectively asserting
that all the methods are consistent:
-
Identity:
fa <*> pure(identity) === fa
, (wherefa
is anF[A]
) i.e. applyingpure(identity)
does nothing. -
Homomorphism:
pure(a) <*> pure(ab) === pure(ab(a))
(whereab
is anA => B
), i.e. applying apure
function to apure
value is the same as applying the function to the value and then usingpure
on the result. -
Interchange:
pure(a) <*> fab === fab <*> pure(f => f(a))
, (wherefab
is anF[A => B]
), i.e.pure
is a left and right identity -
Mappy:
map(fa)(f) === fa <*> pure(f)
Monad
adds additional laws:
-
Left Identity:
pure(a).bind(f) === f(a)
-
Right Identity:
a.bind(pure(_)) === a
-
Associativity:
fa.bind(f).bind(g) === fa.bind(a => f(a).bind(g))
wherefa
is anF[A]
,f
is anA => F[B]
andg
is aB => F[C]
.
Associativity says that chained bind
calls must agree with nested
bind
. However, it does not mean that we can rearrange the order,
which would be commutativity. For example, recalling that flatMap
is an alias to bind
, we cannot rearrange
as
start
and stop
are non-commutative, because the intended
effect of starting then stopping a node is different to stopping then
starting it!
But start
is commutative with itself, and stop
is commutative with
itself, so we can rewrite
as
which are equivalent for our algebra, but not in general. We’re making a lot of assumptions about the Google Container API here, but this is a reasonable choice to make.
A practical consequence is that a Monad
must be commutative if its
applyX
methods can be allowed to run in parallel. We cheated in
Chapter 3 when we ran these effects in parallel
because we know that they are commutative among themselves. When it comes to interpreting our application, later in the book, we will have to provide evidence that these effects are in fact commutative, or an asynchronous implementation may choose to sequence the operations to be on the safe side.
The subtleties of how we deal with (re)-ordering of effects, and what those effects are, deserves a dedicated chapter on Advanced Monads.
5.8 Divide and Conquer
Divide
is the Contravariant
analogue of Apply
divide
says that if we can break a C
into an A
and a B
, and
we’re given an F[A]
and an F[B]
, then we can get an F[C]
. Hence,
divide and conquer.
This is a great way to generate contravariant typeclass instances for
product types by breaking the products into their parts. Scalaz has an
instance of Divide[Equal]
, let’s construct an Equal
for a new
product type Foo
Mirroring Apply
, Divide
also has terse syntax for tuples. A softer
divide so that we may reign approach to world domination:
Generally, if encoder typeclasses can provide an instance of Divide
,
rather than stopping at Contravariant
, it makes it possible to
derive instances for any case class
. Similarly, decoder typeclasses
can provide an Apply
instance. We will explore this in a dedicated
chapter on Typeclass Derivation.
Divisible
is the Contravariant
analogue of Applicative
and introduces
.conquer
, the equivalent of .pure
.conquer
allows creating trivial implementations where the type parameter is
ignored. Such values are called universally quantified. For example, the
Divisible[Equal].conquer[INil[String]]
returns an implementation of Equal
for an empty list of String
which is always true
.
5.9 Plus
Plus
is Semigroup
but for type constructors, and PlusEmpty
is
the equivalent of Monoid
(they even have the same laws) whereas
IsEmpty
is novel and allows us to query if an F[A]
is empty:
Although it may look on the surface as if <+>
behaves like |+|
it is best to think of it as operating only at the F[_]
level, never looking
into the contents. Plus
has the convention that it should ignore failures and
“pick the first winner”. <+>
can therefore be used as a mechanism for early
exit (losing information) and failure-handling via fallbacks:
For example, if we have a NonEmptyList[Option[Int]]
and we want to ignore
None
values (failures) and pick the first winner (Some
), we can call <+>
from Foldable1.foldRight1
:
In fact, now that we know about Plus
, we realise that we didn’t need to break
typeclass coherence (when we defined a locally scoped Monoid[Option[A]]
) in
the section on Appendable Things. Our objective was to “pick the last winner”,
which is the same as “pick the winner” if the arguments are swapped. Note the
use of the TIE Interceptor for ccy
and otc
with arguments swapped.
Applicative
and Monad
have specialised versions of PlusEmpty
.unite
lets us fold a data structure using the outer container’s
PlusEmpty[F].monoid
rather than the inner content’s Monoid
. For
List[Either[String, Int]]
this means Left[String]
values are converted into
.empty
, then everything is concatenated. A convenient way to discard errors:
withFilter
allows us to make use of for
comprehension language
support as discussed in Chapter 2. It is fair to say that the Scala
language has built-in language support for MonadPlus
, not just
Monad
!
Returning to Foldable
for a moment, we can reveal some methods that
we did not discuss earlier
msuml
does a fold
using the Monoid
from the PlusEmpty[G]
and
collapse
does a foldRight
using the PlusEmpty
of the target
type:
5.10 Lone Wolves
Some of the typeclasses in Scalaz are stand-alone and not part of the larger hierarchy.
5.10.1 Zippy
The core method is zip
which is a less powerful version of
Divide.tuple2
, and if a Functor[F]
is provided then zipWith
can
behave like Apply.apply2
. Indeed, an Apply[F]
can be created from
a Zip[F]
and a Functor[F]
by calling ap
.
apzip
takes an F[A]
and a lifted function from F[A] => F[B]
,
producing an F[(A, B)]
similar to Functor.fproduct
.
The core method is unzip
with firsts
and seconds
allowing for
selecting either the first or second element of a tuple in the F
.
Importantly, unzip
is the opposite of zip
.
The methods unzip3
to unzip7
are repeated applications of unzip
to save on boilerplate. For example, if handed a bunch of nested
tuples, the Unzip[Id]
is a handy way to flatten them:
In a nutshell, Zip
and Unzip
are less powerful versions of
Divide
and Apply
, providing useful features without requiring the
F
to make too many promises.
5.10.2 Optional
Optional
is a generalisation of data structures that can optionally
contain a value, like Option
and Either
.
Recall that \/
(disjunction) is Scalaz’s improvement of
scala.Either
. We will also see Maybe
, Scalaz’s improvement of
scala.Option
These are methods that should be familiar, except perhaps pextract
,
which is a way of letting the F[_]
return some implementation
specific F[B]
or the value. For example, Optional[Option].pextract
returns Option[Nothing] \/ A
, i.e. None \/ A
.
Scalaz gives a ternary operator to things that have an Optional
for example
5.11 Co-things
A co-thing typically has some opposite type signature to whatever thing does, but is not necessarily its inverse. To highlight the relationship between thing and co-thing, we will include the type signature of thing wherever we can.
5.11.1 Cobind
cobind
(also known as coflatmap
) takes an F[A] => B
that acts on an F[A]
rather than its elements. But this is not necessarily the full fa
, it can be a
substructure that has been created by .coflatten
.
Compelling use-cases for Cobind
are rare, although when shown in the
Functor
permutation table (for F[_]
, A
and B
) it is difficult
to argue why any method should be less important than the others:
method | parameter |
---|---|
map |
A => B |
contramap |
B => A |
xmap |
(A => B, B => A) |
ap |
F[A => B] |
bind |
A => F[B] |
cobind |
F[A] => B |
5.11.2 Comonad
.copoint
(also .copure
) unwraps an element from its context. The Id
type
alias that we encountered in Chapter 1 has an instance of Comonad
, so we can
reach into an Id
and extract the value it contains. Similarly, Name
has a
Comonad
with .value
effectively being the Value
strategy.
Another example of a Comonad
is the NonEmptyList
, where .copoint
returns
the .head
element and .cobind
operates on all the tails of the list.
Effects do not typically have an instance of Comonad
since it would break
referential transparency to interpret an IO[A]
into an A
.
Comonad
allows navigation over elements of a data structure and eventually
returning to one view of that data. Consider a neighbourhood (Hood
for
short) of a list, containing all the elements to the left (.lefts
) of an
element .focus
, and all the elements to its right (.rights
).
The lefts
and rights
should each be ordered with the nearest to
the focus
at the head, such that we can recover the original IList
via .toIList
We can write methods that let us move the focus one to the left
(.previous
) and one to the right (.next
)
.more
repeatedly applies an optional function to Hood
such that we calculate
all the views that Hood
can take on the list
We can now implement Comonad[Hood]
.cojoin
gives us a Hood[Hood[IList]]
containing all the possible
neighbourhoods in our initial IList
Indeed, .cojoin
is just positions
! We can override
it with a more
direct (and performant) implementation
Comonad
generalises the concept of Hood
to arbitrary data
structures. Hood
is an example of a zipper (unrelated to Zip
).
Scalaz comes with a Zipper
data type for streams (i.e. infinite 1D
data structures), which we will discuss in the next chapter.
One application of a zipper is for cellular automata, which compute the value of each cell in the next generation by performing a computation based on the neighbourhood of that cell.
5.11.3 Cozip
Although named cozip
, it is perhaps more appropriate to talk about
its symmetry with unzip
. Whereas unzip
splits F[_]
of tuples
(products) into tuples of F[_]
, cozip
splits F[_]
of
disjunctions (coproducts) into disjunctions of F[_]
.
5.12 Bi-things
Sometimes we may find ourselves with a thing that has two type holes
and we want to map
over both sides. For example we might be tracking
failures in the left of an Either
and we want to do something with the
failure messages.
The Functor
/ Foldable
/ Traverse
typeclasses have bizarro
relatives that allow us to map both ways.
Although the type signatures are verbose, these are nothing more than
the core methods of Functor
, Foldable
and Bitraverse
taking two
functions instead of one, often requiring both functions to return the
same type so that their results can be combined with a Monoid
or
Semigroup
.
In addition, we can revisit MonadPlus
(recall it is Monad
with the
ability to filterWith
and unite
) and see that it can separate
Bifoldable
contents of a Monad
This is very useful if we have a collection of bi-things and we want
to reorganise them into a collection of A
and a collection of B
5.13 Summary
That was a lot of material! We have just explored a standard library of polymorphic functionality. But to put it into perspective: there are more traits in the Scala stdlib Collections API than typeclasses in Scalaz.
It is normal for an FP application to only touch a small percentage of the typeclass hierarchy, with most functionality coming from domain-specific algebras and typeclasses. Even if the domain-specific typeclasses are just specialised clones of something in Scalaz, it is OK to refactor it later.
To help, we have included a cheat-sheet of the typeclasses and their primary methods in the Appendix, inspired by Adam Rosien’s Scalaz Cheatsheet.
To help further, Valentin Kasas explains how to combine N
things:
6. Scalaz Data Types
Who doesn’t love a good data structure? The answer is nobody, because data structures are awesome.
In this chapter we will explore the collection-like data types in Scalaz, as well as data types that augment the Scala language with useful semantics and additional type safety.
The primary reason we care about having lots of collections at our disposal is performance. A vector and a list can do the same things, but their performance characteristics are different: a vector has constant lookup cost whereas a list must be traversed.
All of the collections presented here are persistent: if we add or remove an element we can still use the old version. Structural sharing is essential to the performance of persistent data structures, otherwise the entire collection is rebuilt with every operation.
Unlike the Java and Scala collections, there is no hierarchy to the data types in Scalaz: these collections are much simpler to understand. Polymorphic functionality is provided by optimised instances of the typeclasses we studied in the previous chapter. This makes it a lot easier to swap implementations for performance reasons, and to provide our own.
6.1 Type Variance
Many of Scalaz’s data types are invariant in their type parameters.
For example, IList[A]
is not a subtype of IList[B]
when A <:
B
.
6.1.1 Covariance
The problem with covariant type parameters, such as class
List[+A]
, is that List[A]
is a subtype of List[Any]
and it is
easy to accidentally lose type information.
Note that the second list is a List[Char]
and the compiler has
unhelpfully inferred the Least Upper Bound (LUB) to be Any
.
Compare to IList
, which requires explicit .widen[Any]
to permit
the heinous crime:
Similarly, when the compiler infers a type with Product with
Serializable
it is a strong indicator that accidental widening has
occurred due to covariance.
Unfortunately we must be careful when constructing invariant data types because LUB calculations are performed on the parameters:
Another similar problem arises from Scala’s Nothing
type, which is a subtype
of all other types, including sealed
ADTs, final
classes, primitives and
null
.
There are no values of type Nothing
: functions that take a Nothing
as a
parameter cannot be run and functions that return Nothing
will never return.
Nothing
was introduced as a mechanism to enable covariant type parameters, but
a consequence is that we can write un-runnable code, by accident. Scalaz says we
do not need covariant type parameters which means that we are limiting ourselves
to writing practical code that can be run.
6.1.2 Contrarivariance
On the other hand, contravariant type parameters, such as trait
Thing[-A]
, can expose devastating bugs in the compiler. Consider Paul
Phillips’ (ex-scalac
team) demonstration of what he calls
contrarivariance:
As expected, the compiler is finding the most specific argument in
each call to f
. However, implicit resolution gives unexpected
results:
Implicit resolution flips its definition of “most specific” for contravariant types, rendering them useless for typeclasses or anything that requires polymorphic functionality. The behaviour is fixed in Dotty.
6.1.3 Limitations of subtyping
scala.Option
has a method .flatten
which will convert
Option[Option[B]]
into an Option[B]
. However, Scala’s type system
is unable to let us write the required type signature. Consider the
following that appears correct, but has a subtle bug:
The A
introduced on .flatten
is shadowing the A
introduced on
the class. It is equivalent to writing
which is not the constraint we want.
To workaround this limitation, Scala defines infix classes <:<
and
=:=
along with implicit evidence that always creates a witness
=:=
can be used to require that two type parameters are exactly the
same and <:<
is used to describe subtype relationships, letting us
implement .flatten
as
Scalaz improves on <:<
and =:=
with Liskov (aliased to <~<
)
and Leibniz (===
).
Other than generally useful methods and implicit conversions, the
Scalaz <~<
and ===
evidence is more principled than in the stdlib.
6.2 Evaluation
Java is a strict evaluation language: all the parameters to a method
must be evaluated to a value before the method is called. Scala
introduces the notion of by-name parameters on methods with a: =>A
syntax. These parameters are wrapped up as a zero argument function
which is called every time the a
is referenced. We seen by-name a
lot in the typeclasses.
Scala also has by-need evaluation of values, with the lazy
keyword: the computation is evaluated at most once to produce the
value. Unfortunately, Scala does not support by-need evaluation of
method parameters.
Scalaz formalises the three evaluation strategies with an ADT
The weakest form of evaluation is Name
, giving no computational
guarantees. Next is Need
, guaranteeing at most once evaluation,
whereas Value
is pre-computed and therefore exactly once
evaluation.
If we wanted to be super-pedantic we could go back to all the
typeclasses and make their methods take Name
, Need
or Value
parameters. Instead we can assume that normal parameters can always be
wrapped in a Value
, and by-name parameters can be wrapped with
Name
.
When we write pure programs, we are free to replace any Name
with
Need
or Value
, and vice versa, with no change to the correctness
of the program. This is the essence of referential transparency: the
ability to replace a computation by its value, or a value by its
computation.
In functional programming we almost always want Value
or Need
(also known as strict and lazy): there is little value in Name
.
Because there is no language level support for lazy method parameters,
methods typically ask for a by-name parameter and then convert it
into a Need
internally, getting a boost to performance.
Name
provides instances of the following typeclasses
Monad
Comonad
Traverse1
Align
-
Zip
/Unzip
/Cozip
6.3 Memoisation
Scalaz has the capability to memoise functions, formalised by Memo
,
which doesn’t make any guarantees about evaluation because of the
diversity of implementations:
memo
allows us to create custom implementations of Memo
, nilMemo
doesn’t memoise, evaluating the function normally. The remaining
implementations intercept calls to the function and cache results
backed by stdlib collection implementations.
To use Memo
we simply wrap a function with a Memo
implementation
and then call the memoised function:
If the function takes more than one parameter, we must tupled
the
method, with the memoised version taking a tuple.
Memo
is typically treated as a special construct and the usual rule
about purity is relaxed for implementations. To be pure only
requires that our implementations of Memo
are referential
transparent in the evaluation of K => V
. We may use mutable data and
perform I/O in the implementation of Memo
, e.g. with an LRU or
distributed cache, without having to declare an effect in the type
signature. Other functional programming languages have automatic
memoisation managed by their runtime environment and Memo
is our way
of extending the JVM to have similar support, unfortunately only on an
opt-in basis.
6.4 Tagging
In the section introducing Monoid
we built a Monoid[TradeTemplate]
and
realised that Scalaz does not do what we wanted with Monoid[Option[A]]
. This
is not an oversight of Scalaz: often we find that a data type can implement a
fundamental typeclass in multiple valid ways and that the default implementation
doesn’t do what we want, or simply isn’t defined.
Basic examples are Monoid[Boolean]
(conjunction &&
vs disjunction ||
) and
Monoid[Int]
(multiplication vs addition).
To implement Monoid[TradeTemplate]
we found ourselves either breaking
typeclass coherency, or using a different typeclass.
scalaz.Tag
is designed to address the multiple typeclass implementation
problem without breaking typeclass coherency.
The definition is quite contorted, but the syntax to use it is very clean. This
is how we trick the compiler into allowing us to define an infix type A @@ T
that is erased to A
at runtime:
Some useful tags are provided in the Tags
object
First
/ Last
are used to select Monoid
instances that pick the first or
last non-zero operand. Multiplication
is for numeric multiplication instead of
addition. Disjunction
/ Conjunction
are to select &&
or ||
,
respectively.
In our TradeTemplate
, instead of using Option[Currency]
we can use
Option[Currency] @@ Tags.Last
. Indeed this is so common that we can use the
built-in alias, LastOption
letting us write a much cleaner Monoid[TradeTemplate]
To create a raw value of type LastOption
, we apply Tag
to an Option
. Here
we are calling Tag(None)
.
In the chapter on typeclass derivation, we will go one step further and
automatically derive the monoid
.
It is tempting to use Tag
to markup data types for some form of validation
(e.g. String @@ PersonName
), but this should be avoided because there are no
checks on the content of the runtime value. Tag
should only be used for
typeclass selection purposes. Prefer the Refined
library, introduced in
Chapter 4, to constrain values.
6.5 Natural Transformations
A function from one type to another is written as A => B
in Scala, which is
syntax sugar for a Function1[A, B]
. Scalaz provides similar syntax sugar F ~>
G
for functions over type constructors F[_]
to G[_]
.
These F ~> G
are called natural transformations and are universally
quantified because they don’t care about the contents of F[_]
.
An example of a natural transformation is a function that converts an IList
into a List
Or, more concisely, making use of kind-projector
’s syntax sugar:
However, in day-to-day development, it is far more likely that we will use a
natural transformation to map between algebras. For example, in
drone-dynamic-agents
we may want to implement our Google Container Engine
Machines
algebra with an off-the-shelf algebra, BigMachines
. Instead of
changing all our business logic and tests to use this new BigMachines
interface, we may be able to write a transformation from Machines ~>
BigMachines
. We will return to this idea in the chapter on Advanced Monads.
6.6 Isomorphism
Sometimes we have two types that are really the same thing, causing compatibility problems because the compiler doesn’t know what we know. This typically happens when we use third party code that is the same as something we already have.
This is when Isomorphism
can help us out. An isomorphism defines a formal “is
equivalent to” relationship between two types. There are three variants, to
account for types of different shapes:
The type aliases IsoSet
, IsoFunctor
and IsoBifunctor
cover the common
cases: a regular function, natural transformation and binatural. Convenience
functions allow us to generate instances from existing functions or natural
transformations. However, it is often easier to use one of the abstract
Template
classes to define an isomorphism. For example:
If we introduce an isomorphism, we can generate many of the standard typeclasses. For example
allows us to derive a Semigroup[F]
for a type F
if we have an F <=> G
and
a Semigroup[G]
. Almost all the typeclasses in the hierarchy provide an
isomorphic variant. If we find ourselves copying and pasting a typeclass
implementation, it is worth considering if Isomorphism
is the better solution.
6.7 Containers
6.7.1 Maybe
We have already encountered Scalaz’s improvement over scala.Option
, called
Maybe
. It is an improvement because it is invariant and does not have any
unsafe methods like Option.get
, which can throw an exception.
It is typically used to represent when a thing may be present or not without giving any extra context as to why it may be missing.
The .empty
and .just
companion methods are preferred to creating
raw Empty
or Just
instances because they return a Maybe
, helping
with type inference. This pattern is often referred to as returning a
sum type, which is when we have multiple implementations of a
sealed trait
but never use a specific subtype in a method signature.
A convenient implicit class
allows us to call .just
on any value
and receive a Maybe
Maybe
has a typeclass instance for all the things
Align
Traverse
-
MonadPlus
/IsEmpty
Cobind
-
Cozip
/Zip
/Unzip
Optional
and delegate instances depending on A
-
Monoid
/Band
-
Equal
/Order
/Show
In addition to the above, Maybe
has functionality that is not supported by a
polymorphic typeclass.
.cata
is a terser alternative to .map(f).getOrElse(b)
and has the
simpler form |
if the map is identity
(i.e. just .getOrElse
).
.toLeft
and .toRight
, and their symbolic aliases, create a disjunction
(explained in the next section) by taking a fallback for the Empty
case.
.orZero
takes a Monoid
to define the default value.
.orEmpty
uses an ApplicativePlus
to create a single element or
empty container, not forgetting that we already get support for stdlib
collections from the Foldable
instance’s .to
method.
6.7.2 Either
Scalaz’s improvement over scala.Either
is symbolic, but it is common
to speak about it as either or Disjunction
with corresponding syntax
allowing for easy construction of values. Note that the extension
method takes the type of the other side. So if we wish to create a
String \/ Int
and we have an Int
, we must pass String
when
calling .right
The symbolic nature of \/
makes it read well in type signatures when
shown infix. Note that symbolic types in Scala associate from the left
and nested \/
must have parentheses, e.g. (A \/ (B \/ (C \/ D))
.
\/
has right-biased (i.e. flatMap
applies to \/-
) typeclass
instances for:
-
Monad
/MonadError
-
Traverse
/Bitraverse
Plus
Optional
Cozip
and depending on the contents
-
Equal
/Order
-
Semigroup
/Monoid
/Band
In addition, there are custom methods
.fold
is similar to Maybe.cata
and requires that both the left and
right sides are mapped to the same type.
.swap
swaps a left into a right and a right into a left.
The |
alias to getOrElse
appears similarly to Maybe
. We also get
|||
as an alias to orElse
.
+++
is for combining disjunctions with lefts taking preference over
right:
-
right(v1) +++ right(v2)
givesright(v1 |+| v2)
-
right(v1) +++ left (v2)
givesleft (v2)
-
left (v1) +++ right(v2)
givesleft (v1)
-
left (v1) +++ left (v2)
givesleft (v1 |+| v2)
.toEither
is provided for backwards compatibility with the Scala
stdlib.
The combination of :?>>
and <<?:
allow for a convenient syntax to
ignore the contents of an \/
, but pick a default based on its type
6.7.3 Validation
At first sight, Validation
(aliased with \?/
, happy Elvis)
appears to be a clone of Disjunction
:
With convenient syntax
However, the data structure itself is not the complete story.
Validation
intentionally does not have an instance of any Monad
,
restricting itself to success-biased versions of:
Applicative
-
Traverse
/Bitraverse
Cozip
Plus
Optional
and depending on the contents
-
Equal
/Order
Show
-
Semigroup
/Monoid
The big advantage of restricting to Applicative
is that Validation
is explicitly for situations where we wish to report all failures,
whereas Disjunction
is used to stop at the first failure. To
accommodate failure accumulation, a popular form of Validation
is
ValidationNel
, having a NonEmptyList[E]
in the failure position.
Consider performing input validation of data provided by a user using
Disjunction
and flatMap
:
If we use |@|
syntax
we still get back the first failure. This is because Disjunction
is
a Monad
, its .applyX
methods must be consistent with .flatMap
and not assume that any operations can be performed out of order.
Compare to:
This time, we get back all the failures!
Validation
has many of the same methods as Disjunction
, such as
.fold
, .swap
and +++
, plus some extra:
.append
(aliased by +|+
) has the same type signature as +++
but
prefers the success
case
-
failure(v1) +|+ failure(v2)
givesfailure(v1 |+| v2)
-
failure(v1) +|+ success(v2)
givessuccess(v2)
-
success(v1) +|+ failure(v2)
givessuccess(v1)
-
success(v1) +|+ success(v2)
givessuccess(v1 |+| v2)
.disjunction
converts a Validated[A, B]
into an A \/ B
.
Disjunction has the mirror .validation
and .validationNel
to
convert into Validation
, allowing for easy conversion between
sequential and parallel failure accumulation.
\/
and Validation
are the more performant FP equivalent of a checked
exception for input validation, avoiding both a stacktrace and requiring the
caller to deal with the failure resulting in more robust systems.
6.7.4 These
We encountered These
, a data encoding of inclusive logical OR
,
when we learnt about Align
.
with convenient construction syntax
These
has typeclass instances for
Monad
Bitraverse
Traverse
Cobind
and depending on contents
-
Semigroup
/Monoid
/Band
-
Equal
/Order
Show
These
(\&/
) has many of the methods we have come to expect of
Disjunction
(\/
) and Validation
(\?/
)
.append
has 9 possible arrangements and data is never thrown away
because cases of This
and That
can always be converted into a
Both
.
.flatMap
is right-biased (Both
and That
), taking a Semigroup
of the left content (This
) to combine rather than break early. &&&
is a convenient way of binding over two of these, creating a tuple
on the right and dropping data if it is not present in each of
these.
Although it is tempting to use \&/
in return types, overuse is an
anti-pattern. The main reason to use \&/
is to combine or split
potentially infinite streams of data in finite memory. Convenient
functions exist on the companion to deal with EphemeralStream
(aliased here to fit in a single line) or anything with a MonadPlus
6.7.5 Higher Kinded Either
The Coproduct
data type (not to be confused with the more general concept of a
coproduct in an ADT) wraps Disjunction
for type constructors:
Typeclass instances simply delegate to those of the F[_]
and G[_]
.
The most popular use case for Coproduct
is when we want to create an anonymous
coproduct of multiple ADTs.
6.7.6 Not So Eager
Built-in Scala tuples, and basic data types like Maybe
and
Disjunction
are eagerly-evaluated value types.
For convenience, by-name alternatives to Name
are provided, having
the expected typeclass instances:
The astute reader will note that Lazy*
is a misnomer, and these data
types should perhaps be: ByNameTupleX
, ByNameOption
and
ByNameEither
.
6.7.7 Const
Const
, for constant, is a wrapper for a value of type A
, along with a
spare type parameter B
.
Const
provides an instance of Applicative[Const[A, ?]]
if there is a
Monoid[A]
available:
The most important thing about this Applicative
is that it ignores the B
parameters, continuing on without failing and only combining the constant values
that it encounters.
Going back to our example application drone-dynamic-agents
, we should first
refactor our logic.scala
file to use Applicative
instead of Monad
. We
wrote logic.scala
before we learnt about Applicative
and now we know better:
Since our business logic only requires an Applicative
, we can write mock
implementations with F[a]
as Const[String, a]
. In each case, we return the
name of the function that is called:
With this interpretation of our program, we can assert on the methods that are called:
Alternatively, we could have counted total method calls by using Const[Int, ?]
or an IMap[String, Int]
.
With this test, we’ve gone beyond traditional Mock testing with a Const
test
that asserts on what is called without having to provide implementations. This
is useful if our specification demands that we make certain calls for certain
input, e.g. for accounting purposes. Furthermore, we’ve achieved this with
compiletime safety.
Taking this line of thinking a little further, say we want to monitor (in
production) the nodes that we are stopping in act
. We can create
implementations of Drone
and Machines
with Const
, calling it from our
wrapped version of act
We can do this because monitor
is pure and running it produces no side
effects.
This runs the program with ConstImpl
, extracting all the calls to
Machines.stop
, then returning it alongside the WorldView
. We can unit test
this:
We have used Const
to do something that looks like Aspect Oriented
Programming, once popular in Java. We built on top of our business logic to
support a monitoring concern, without having to complicate the business logic.
It gets even better. We can run ConstImpl
in production to gather what we want
to stop
, and then provide an optimised implementation of act
that can make
use of implementation-specific batched calls.
The silent hero of this story is Applicative
. Const
lets us show off what is
possible. If we need to change our program to require a Monad
, we can no
longer use Const
and must write full mocks to be able to assert on what is
called under certain inputs. The Rule of Least Power demands that we use
Applicative
instead of Monad
wherever we can.
6.8 Collections
Unlike the stdlib Collections API, the Scalaz approach describes collection
behaviours in the typeclass hierarchy, e.g. Foldable
, Traverse
, Monoid
.
What remains to be studied are the implementations in terms of data structures,
which have different performance characteristics and niche methods.
This section goes into the implementation details for each data type. It is not essential to remember everything presented here: the goal is to gain a high level understanding of how each data structure works.
Because all the collection data types provide more or less the same list of typeclass instances, we shall avoid repeating the list, which is often some variation of:
Monoid
-
Traverse
/Foldable
-
MonadPlus
/IsEmpty
-
Cobind
/Comonad
-
Zip
/Unzip
Align
-
Equal
/Order
Show
Data structures that are provably non-empty are able to provide
-
Traverse1
/Foldable1
and provide Semigroup
instead of Monoid
, Plus
instead of IsEmpty
.
6.8.1 Lists
We have used IList[A]
and NonEmptyList[A]
so many times by now that they
should be familiar. They codify a classic linked list data structure:
The main advantage of IList
over stdlib List
is that there are no
unsafe methods, like .head
which throws an exception on an empty
list.
In addition, IList
is a lot simpler, having no hierarchy and a
much smaller bytecode footprint. Furthermore, the stdlib List
has a
terrifying implementation that uses var
to workaround performance
problems in the stdlib collection design:
List
creation requires careful, and slow, Thread
synchronisation
to ensure safe publishing. IList
requires no such hacks and can
therefore outperform List
.
6.8.2 EphemeralStream
The stdlib Stream
is a lazy version of List
, but is riddled with
memory leaks and unsafe methods. EphemeralStream
does not keep
references to computed values, helping to alleviate the memory
retention problem, and removing unsafe methods in the same spirit as
IList
.
.cons
, .unfold
and .iterate
are mechanisms for creating streams, and the
convenient syntax ##::
puts a new element at the head of a by-name EStream
reference. .unfold
is for creating a finite (but possibly infinite) stream by
repeatedly applying a function f
to get the next value and input for the
following f
. .iterate
creates an infinite stream by repeating a function f
on the previous element.
EStream
may appear in pattern matches with the symbol ##::
,
matching the syntax for .cons
.
Although EStream
addresses the value memory retention problem, it is
still possible to suffer from slow memory leaks if a live reference
points to the head of an infinite stream. Problems of this nature, as
well as the need to compose effectful streams, are why fs2 exists.
6.8.3 CorecursiveList
Corecursion is when we start from a base state and produce subsequent steps
deterministically, like the EphemeralStream.unfold
method that we just
studied:
Contrast to recursion, which breaks data into a base state and then terminates.
A CorecursiveList
is a data encoding of EphemeralStream.unfold
, offering an
alternative to EStream
that may perform better in some circumstances:
Corecursion is useful when implementing Comonad.cojoin
, like our Hood
example. CorecursiveList
is a good way to codify non-linear recurrence
equations like those used in biology population models, control systems, macro
economics, and investment banking models.
6.8.4 ImmutableArray
A simple wrapper around mutable stdlib Array
, with primitive
specialisations:
Array
is unrivalled in terms of read performance and heap size.
However, there is zero structural sharing when creating new arrays,
therefore arrays are typically used only when their contents are not
expected to change, or as a way of safely wrapping raw data from a
legacy system.
6.8.5 Dequeue
A Dequeue
(pronounced like a “deck” of cards) is a linked list that
allows items to be put onto or retrieved from the front (cons
) or
the back (snoc
) in constant time. Removing an element from either
end is constant time on average.
The way it works is that there are two lists, one for the front data
and another for the back. Consider an instance holding symbols a0,
a1, a2, a3, a4, a5, a6
which can be visualised as
Note that the list holding the back
is in reverse order.
Reading the snoc
(final element) is a simple lookup into
back.head
. Adding an element to the end of the Dequeue
means
adding a new element to the head of the back
, and recreating the
FullDequeue
wrapper (which will increase backSize
by one). Almost
all of the original structure is shared. Compare to adding a new
element to the end of an IList
, which would involve recreating the
entire structure.
The frontSize
and backSize
are used to re-balance the front
and
back
so that they are always approximately the same size.
Re-balancing means that some operations can be slower than others
(e.g. when the entire structure must be rebuilt) but because it
happens only occasionally, we can take the average of the cost and say
that it is constant.
6.8.6 DList
Linked lists have poor performance characteristics when large lists are appended together. Consider the work that goes into evaluating the following:
This creates six intermediate lists, traversing and rebuilding every list three
times (except for gs
which is shared between all stages).
The DList
(for difference list) is a more efficient solution for this
scenario. Instead of performing the calculations at each stage, it is
represented as a function IList[A] => IList[A]
The equivalent calculation is (the symbols created via DList.fromIList
)
which breaks the work into right-associative (i.e. fast) appends
utilising the fast constructor on IList
.
As always, there is no free lunch. There is a memory allocation overhead that
can slow down code that naturally results in right-associative appends. The
largest speedup is when IList
operations are left-associative, e.g.
Difference lists suffer from bad marketing. If they were called a
ListBuilderFactory
they’d probably be in the standard library.
6.8.7 ISet
Tree structures are excellent for storing ordered data, with every binary node holding elements that are less than in one branch, and greater than in the other. However, naive implementations of a tree structure can become unbalanced depending on the insertion order. It is possible to maintain a perfectly balanced tree, but it is incredibly inefficient as every insertion effectively rebuilds the entire tree.
ISet
is an implementation of a tree of bounded balance, meaning that it is
approximately balanced, using the size
of each branch to balance a node.
ISet
requires A
to have an Order
. The Order[A]
instance must remain the
same between calls or internal assumptions will be invalid, leading to data
corruption: i.e. we are assuming typeclass coherence such that Order[A]
is
unique for any A
.
The ISet
ADT unfortunately permits invalid trees. We strive to write ADTs that
fully describe what is and isn’t valid through type restrictions, but sometimes
there are situations where it can only be achieved by the inspired touch of an
immortal. Instead, Tip
/ Bin
are private
, to stop users from accidentally
constructing invalid trees. .insert
is the only way to build an ISet
,
therefore defining what constitutes a valid tree.
The internal methods .balanceL
and .balanceR
are mirrors of each other, so
we only study .balanceL
, which is called when the value we are inserting is
less than the current node. It is also called by the .delete
method.
Balancing requires us to classify the scenarios that can occur. We will go
through each possible scenario, visualising the (y, left, right)
on the left
side of the page, with the balanced structure on the right, also known as the
rotated tree.
- filled circles visualise a
Tip
- three columns visualise the
left | value | right
fields ofBin
- diamonds visualise any
ISet
The first scenario is the trivial case, which is when both the left
and
right
are Tip
. In fact we will never encounter this scenario from .insert
,
but we hit it in .delete
The second case is when left
is a Bin
containing only Tip
, we don’t need
to balance anything, we just create the obvious connection:
The third case is when it starts to get interesting: left
is a Bin
containing a Bin
in its right
But what happened to the two diamonds sitting below lrx
? Didn’t we just lose
information? No, we didn’t lose information, because we can reason (based on
size balancing) that they are always Tip
! There is no rule in any of the
following scenarios (or in .balanceR
) that can produce a tree of the shape
where the diamonds are Bin
.
The fourth case is the opposite of the third case.
The fifth case is when we have full trees on both sides of the left
and we
must use their relative sizes to decide on how to re-balance.
For the first branch, 2*ll.size > lr.size
and for the second branch 2*ll.size <= lr.size
The sixth scenario introduces a tree on the right
. When the left
is empty we
create the obvious connection. This scenario never arises from .insert
because
the left
is always non-empty:
The final scenario is when we have non-empty trees on both sides. Unless the
left
is three times or more the size of the right
, we can do the simple
thing and create a new Bin
However, should the left
be more than three times the size of the right
, we
must balance based on the relative sizes of ll
and lr
, like in scenario
five.
This concludes our study of the .insert
method and how the ISet
is
constructed. It should be of no surprise that Foldable
is implemented in terms
of depth-first search along the left
or right
, as appropriate. Methods such
as .minimum
and .maximum
are optimal because the data structure already
encodes the ordering.
It is worth noting that some typeclass methods cannot be implemented as
efficiently as we would like. Consider the signature of Foldable.element
The obvious implementation for .element
is to defer to (almost) binary-search
ISet.contains
. However, it is not possible because .element
provides Equal
whereas .contains
requires Order
.
ISet
is unable to provide a Functor
for the same reason. In practice this
turns out to be a sensible constraint: performing a .map
would involve
rebuilding the entire structure. It is sensible to convert to some other
datatype, such as IList
, perform the .map
, and convert back. A consequence
is that it is not possible to have Traverse[ISet]
or Applicative[ISet]
.
6.8.8 IMap
This is very familiar! Indeed, IMap
(an alias to the lightspeed operator
==>>
) is another size-balanced tree, but with an extra value: B
field in
each binary branch, allowing it to store key/value pairs. Only the key type A
needs an Order
and a suite of convenient methods are provided to allow easy
entry updating
6.8.9 StrictTree
and Tree
Both StrictTree
and Tree
are implementations of a Rose Tree, a tree
structure with an unbounded number of branches in every node (unfortunately
built from standard library collections for legacy reasons):
Tree
is a by-need version of StrictTree
with convenient constructors
The user of a Rose Tree is expected to manually balance it, which makes it suitable for cases where it is useful to encode domain knowledge of a hierarchy into the data structure. For example, in artificial intelligence, a Rose Tree can be used in clustering algorithms to organise data into a hierarchy of increasingly similar things. It is possible to represent XML documents with a Rose Tree.
When working with hierarchical data, consider using a Rose Tree instead of rolling a custom data structure.
6.8.10 FingerTree
Finger trees are generalised sequences with amortised constant cost lookup and
logarithmic concatenation. A
is the type of data, ignore V
for now:
Visualising FingerTree
as dots, Finger
as boxes and Node
as boxes within
boxes:
Adding elements to the front of a FingerTree
with +:
is efficient because
Deep
simply adds the new element to its left
finger. If the finger is a
Four
, we rebuild the spine
to take 3 of the elements as a Node3
. Adding to
the end, :+
, is the same but in reverse.
Appending |+|
(also <++>
) is more efficient than adding one element at a
time because the case of two Deep
trees can retain the outer branches,
rebuilding the spine based on the 16 possible combinations of the two Finger
values in the middle.
In the above we skipped over V
. Not shown in the ADT description is an
implicit measurer: Reducer[A, V]
on every element of the ADT.
Reducer
is an extension of Monoid
that allows for single elements to be
added to an M
For example, Reducer[A, IList[A]]
can provide an efficient .cons
6.8.10.1 IndSeq
If we use Int
as V
, we can get an indexed sequence, where the measure is
size, allowing us to perform index-based lookup by comparing the desired index
with the size at each branch in the structure:
Another use of FingerTree
is as an ordered sequence, where the measure stores
the largest value contained by each branch:
6.8.10.2 OrdSeq
OrdSeq
has no typeclass instances so it is only useful for incrementally
building up an ordered sequence, with duplicates. We can access the underlying
FingerTree
when needed.
6.8.10.3 Cord
The most common use of FingerTree
is as an intermediate holder for String
representations in Show
. Building a single String
can be thousands of times
faster than the default case class
implementation of nested .toString
, which
builds a String
for every layer in the ADT.
For example, the Cord[String]
instance returns a Three
with the string in
the middle and quotes on either side
Therefore a String
renders as it is written in source code
6.8.11 Heap
Priority Queue
A priority queue is a data structure that allows fast insertion of ordered elements, allowing duplicates, with fast access to the minimum value (highest priority). The structure is not required to store the non-minimal elements in order. A naive implementation of a priority queue could be
This push
is a very fast O(1)
, but reorder
(and therefore pop
) relies on
IList.sorted
costing O(n log n)
.
Scalaz encodes a priority queue with a tree structure where every node has a
value less than its children. Heap
has fast push (insert
), union
, size
,
pop (uncons
) and peek (minimumO
) operations:
Heap
is implemented with a Rose Tree
of Ranked
values, where the rank
is
the depth of a subtree, allowing us to depth-balance the tree. We manually
maintain the tree so the minimum
value is at the top. An advantage of encoding
the minimum value in the data structure is that minimumO
(also known as
peek) is a free lookup:
When inserting a new entry, we compare to the current minimum and replace if the new entry is lower:
Insertions of non-minimal values result in an unordered structure in the branches of the minimum. When we encounter two or more subtrees of equal rank, we optimistically put the minimum to the front:
Avoiding a full ordering of the tree makes insert
very fast, O(1)
, such that
producers adding to the queue are not penalised. However, the consumer pays the
cost when calling uncons
, with deleteMin
costing O(log n)
because it must
search for the minimum value, and remove it from the tree by rebuilding. That Is
fast when compared to the naive implementation.
The union
operation also delays ordering allowing it to be O(1)
.
If the Order[Foo]
does not correctly capture the priority we want for the
Heap[Foo]
, we can use Tag
and provide a custom Order[Foo @@ Custom]
for a
Heap[Foo @@ Custom]
.
6.8.12 Diev
(Discrete Intervals)
We can efficiently encode the (unordered) integer values 6, 9, 2, 13, 8, 14, 10,
7, 5 as inclusive intervals [2, 2], [5, 10], [13, 14]
. Diev
is an efficient
encoding of intervals for elements A
that have an Enum[A]
, getting more
efficient as the contents become denser.
When updating the Diev
, adjacent intervals are merged (and then ordered) such
that there is a unique representation for a given set of values.
A great usecase for Diev
is for storing time periods. For example, in our
TradeTemplate
from the previous chapter
if we find that the payments
are very dense, we may wish to swap to a Diev
representation for performance reasons, without any change in our business logic
because we used Monoid
, not any List
specific methods. We would, however,
have to provide an Enum[LocalDate]
, which is an otherwise useful thing to
have.
6.8.13 OneAnd
Recall that Foldable
is the Scalaz equivalent of a collections API and
Foldable1
is for non-empty collections. So far we have only seen
NonEmptyList
to provide a Foldable1
. The simple data structure OneAnd
wraps any other collection to turn it into a Foldable1
:
NonEmptyList[A]
could be an alias to OneAnd[IList, A]
. Similarly, we can
create non-empty Stream
, DList
and Tree
structures. However it may break
ordering and uniqueness characteristics of the underlying structure: a
OneAnd[ISet, A]
is not a non-empty ISet
, it is an ISet
with a guaranteed
first element that may also be in the ISet
.
6.9 Summary
In this chapter we have skimmed over the data types that Scalaz has to offer.
It is not necessary to remember everything from this chapter: think of each section as having planted the kernel of an idea.
The world of functional data structures is an active area of research. Academic publications appear regularly with new approaches to old problems. Implementing a functional data structure from the literature is a good contribution to the Scalaz ecosystem.
7. Advanced Monads
You have to know things like Advanced Monads in order to be an advanced functional programmer.
However, we are developers yearning for a simple life, and our idea of
“advanced” is modest. To put it into context: scala.concurrent.Future
is more
complicated and nuanced than any Monad
in this chapter.
In this chapter we will study some of the most important implementations of
Monad
.
7.1 Always in motion is the Future
The biggest problem with Future
is that it eagerly schedules work during
construction. As we discovered in the introduction, Future
conflates the
definition of a program with interpreting it (i.e. running it).
Future
is also bad from a performance perspective: every time .flatMap
is
called, a closure is submitted to an Executor
, resulting in unnecessary thread
scheduling and context switching. It is not unusual to see 50% of our CPU power
dealing with thread scheduling, instead of doing the work. So much so that
parallelising work with Future
can often make it slower.
Combined, eager evaluation and executor submission means that it is impossible
to know when a job started, when it finished, or the sub-tasks that were spawned
to calculate the final result. It should not surprise us that performance
monitoring “solutions” for Future
based frameworks are a solid earner for the
modern day snake oil merchant.
Furthermore, Future.flatMap
requires an ExecutionContext
to be in implicit
scope: users are forced to think about business logic and execution semantics at
the same time.
7.2 Effects and Side Effects
If we cannot call side-effecting methods in our business logic, or in Future
(or Id
, or Either
, or Const
, etc), when can we write them? The answer
is: in a Monad
that delays execution until it is interpreted at the
application’s entrypoint. We can now refer to I/O and mutation as an effect on
the world, captured by the type system, as opposed to having a hidden
side-effect.
The simplest implementation of such a Monad
is IO
, formalising the version
we wrote in the introduction:
The .interpret
method is only called once, in the entrypoint of an
application:
However, there are two big problems with this simple IO
:
- it can stack overflow
- it doesn’t support parallel computations
Both of these problems will be overcome in this chapter. However, no matter how
complicated the internal implementation of a Monad
, the principles described
here remain true: we’re modularising the definition of a program and its
execution, such that we can capture effects in type signatures, allowing us to
reason about them, and reuse more code.
7.3 Stack Safety
On the JVM, every method call adds an entry to the call stack of the Thread
,
like adding to the front of a List
. When the method completes, the method at
the head
is thrown away. The maximum length of the call stack is determined by
the -Xss
flag when starting up java
. Tail recursive methods are detected by
the Scala compiler and do not add an entry. If we hit the limit, by calling too
many chained methods, we get a StackOverflowError
.
Unfortunately, every nested call to our IO
’s .flatMap
adds another method
call to the stack. The easiest way to see this is to repeat an action forever,
and see if it survives for longer than a few seconds. We can use .forever
,
from Apply
(a parent of Monad
):
Scalaz has a typeclass that Monad
instances can implement if they are stack
safe: BindRec
requires a constant stack space for recursive bind
:
We don’t need BindRec
for all programs, but it is essential for a general
purpose Monad
implementation.
The way to achieve stack safety is to convert method calls into references to an
ADT, the Free
monad:
The Free
ADT is a natural data type representation of the Monad
interface:
-
Return
represents.point
-
Gosub
represents.bind
/.flatMap
When an ADT mirrors the arguments of related functions, it is called a Church encoding.
Free
is named because it can be generated for free for any S[_]
. For
example, we could set S
to be the Drone
or Machines
algebras from Chapter
3 and generate a data structure representation of our program. We will return to
why this is useful at the end of this chapter.
7.3.1 Trampoline
Free
is more general than we need for now. Setting the algebra S[_]
to ()
=> ?
, a deferred calculation or thunk, we get Trampoline
and can implement
a stack safe Monad
The BindRec
implementation, .tailrecM
, runs .bind
until we get a B
.
Although this is not technically a @tailrec
implementation, it uses constant
stack space because each call returns a heap object, with delayed recursion.
Convenient functions are provided to create a Trampoline
eagerly (.done
) or
by-name (.delay
). We can also create a Trampoline
from a by-name
Trampoline
(.suspend
):
When we see Trampoline[A]
in a codebase we can always mentally substitute it
with A
, because it is simply adding stack safety to the pure computation. We
get the A
by interpreting Free
, provided by .run
.
7.3.2 Example: Stack Safe DList
In the previous chapter we described the data type DList
as
However, the actual implementation looks more like:
Instead of applying nested calls to f
we use a suspended Trampoline
. We
interpret the trampoline with .run
only when needed, e.g. in toIList
. The
changes are minimal, but we now have a stack safe DList
that can rearrange the
concatenation of a large number lists without blowing the stack!
7.3.3 Stack Safe IO
Similarly, our IO
can be made stack safe thanks to Trampoline
:
The interpreter, .unsafePerformIO()
, has an intentionally scary name to
discourage using it except in the entrypoint of the application.
This time, we don’t get a stack overflow error:
Using a Trampoline
typically introduces a performance regression vs a regular
reference. It is Free
in the sense of freely generated, not free as in
beer.
7.4 Monad Transformer Library
Monad transformers are data structures that wrap an underlying value and provide a monadic effect.
For example, in Chapter 2 we used OptionT
to let us use F[Option[A]]
in a
for
comprehension as if it was just a F[A]
. This gave our program the effect
of an optional value. Alternatively, we can get the effect of optionality if
we have a MonadPlus
.
This subset of data types and extensions to Monad
are often referred to as the
Monad Transformer Library (MTL), summarised below. In this section, we will
explain each of the transformers, why they are useful, and how they work.
Effect | Underlying | Transformer | Typeclass |
---|---|---|---|
optionality | F[Maybe[A]] |
MaybeT |
MonadPlus |
errors | F[E \/ A] |
EitherT |
MonadError |
a runtime value | A => F[B] |
ReaderT |
MonadReader |
journal / multitask | F[(W, A)] |
WriterT |
MonadTell |
evolving state | S => F[(S, A)] |
StateT |
MonadState |
keep calm & carry on | F[E \&/ A] |
TheseT |
|
control flow | (A => F[B]) => F[B] |
ContT |
7.4.1 MonadTrans
Each transformer has the general shape T[F[_], A]
, providing at least an
instance of Monad
and Hoist
(and therefore MonadTrans
):
.liftM
lets us create a monad transformer if we have an F[A]
. For example,
we can create an OptionT[IO, String]
by calling .liftM[OptionT]
on an
IO[String]
.
.hoist
is the same idea, but for natural transformations.
Generally, there are three ways to create a monad transformer:
- from the underlying, using the transformer’s constructor
- from a single value
A
, using.pure
from theMonad
syntax - from an
F[A]
, using.liftM
from theMonadTrans
syntax
Due to the way that type inference works in Scala, this often means that a complex type parameter must be explicitly written. As a workaround, transformers provide convenient constructors on their companion that are easier to use.
7.4.2 MaybeT
OptionT
, MaybeT
and LazyOptionT
have similar implementations, providing
optionality through Option
, Maybe
and LazyOption
, respectively. We will
focus on MaybeT
to avoid repetition.
providing a MonadPlus
This monad looks fiddly, but it is just delegating everything to the Monad[F]
and then re-wrapping with a MaybeT
. It is plumbing.
With this monad we can write logic that handles optionality in the F[_]
context, rather than carrying around Option
or Maybe
.
For example, say we are interfacing with a social media website to count the
number of stars a user has, and we start with a String
that may or may not
correspond to a user. We have this algebra:
We need to call getUser
followed by getStars
. If we use Monad
as our
context, our function is difficult because we have to handle the Empty
case:
However, if we have a MonadPlus
as our context, we can suck Maybe
into the
F[_]
with .orEmpty
, and forget about it:
However adding a MonadPlus
requirement can cause problems downstream if the
context does not have one. The solution is to either change the context of the
program to MaybeT[F, ?]
(lifting the Monad[F]
into a MonadPlus
), or to
explicitly use MaybeT
in the return type, at the cost of slightly more code:
The decision to require a more powerful Monad
vs returning a transformer is
something that each team can decide for themselves based on the interpreters
that they plan on using for their program.
7.4.3 EitherT
An optional value is a special case of a value that may be an error, but we
don’t know anything about the error. EitherT
(and the lazy variant
LazyEitherT
) allows us to use any type we want as the error value, providing
contextual information about what went wrong.
EitherT
is a wrapper around an F[A \/ B]
The Monad
is a MonadError
.raiseError
and .handleError
are self-descriptive: the equivalent of throw
and catch
an exception, respectively.
MonadError
has some addition syntax for dealing with common problems:
.attempt
brings errors into the value, which is useful for exposing errors in
subsystems as first class values.
.recover
is for turning an error into a value for all cases, as opposed to
.handleError
which takes an F[A]
and therefore allows partial recovery.
.emap
, either map, is to apply transformations that can fail.
The MonadError
for EitherT
is:
It should be of no surprise that we can rewrite the MonadPlus
example with
MonadError
, inserting informative error messages:
where .orError
is a convenience method on Maybe
The version using EitherT
directly looks like
The simplest instance of MonadError
is for \/
, perfect for testing business
logic that requires a MonadError
. For example,
Our unit tests for .stars
might cover these cases:
As we’ve now seen several times, we can focus on testing the pure business logic without distraction.
Finally, if we return to our JsonClient
algebra from Chapter 4.3
recall that we only coded the happy path into the API. If our interpreter for
this algebra only works for an F
having a MonadError
we get to define the
kinds of errors as a tangential concern. Indeed, we can have two layers of
error if we define the interpreter for a EitherT[IO, JsonClient.Error, ?]
which cover I/O (network) problems, server status problems, and issues with our modelling of the server’s JSON payloads.
7.4.3.1 Choosing an error type
The community is undecided on the best strategy for the error type E
in
MonadError
.
One school of thought says that we should pick something general, like a
String
. The other school says that an application should have an ADT of
errors, allowing different errors to be reported or handled differently. An
unprincipled gang prefers using Throwable
for maximum JVM compatibility.
There are two problems with an ADT of errors on the application level:
- it is very awkward to create a new error. One file becomes a monolithic repository of errors, aggregating the ADTs of individual subsystems.
- no matter how granular the errors are, the resolution is often the same: log it and try it again, or give up. We don’t need an ADT for this.
An error ADT is of value if every entry allows a different kind of recovery to be performed.
A compromise between an error ADT and a String
is an intermediary format. JSON
is a good choice as it can be understood by most logging and monitoring
frameworks.
A problem with not having a stacktrace is that it can be hard to localise which
piece of code was the source of an error. With sourcecode
by Li Haoyi, we can
include contextual information as metadata in our errors:
Although Err
is referentially transparent, the implicit construction of a
Meta
does not appear to be referentially transparent from a natural reading:
two calls to Meta.gen
(invoked implicitly when creating an Err
) will produce
different values because the location in the source code impacts the returned
value:
To understand this, we have to appreciate that sourcecode.*
methods are macros
that are generating source code for us. If we were to write the above explicitly
it is clear what is happening:
Yes, we’ve made a deal with the macro devil, but we could also write the Meta
manually and have it go out of date quicker than our documentation.
7.4.4 ReaderT
The reader monad wraps A => F[B]
allowing a program F[B]
to depend on a
runtime value A
. For those familiar with dependency injection, the reader
monad is the FP equivalent of Spring or Guice’s @Inject
, without the XML and
reflection.
ReaderT
is just an alias to another more generally useful data type named
after the mathematician Heinrich Kleisli.
An implicit
conversion on the companion allows us to use a Kleisli
in place
of a function, so we can provide it as the parameter to a monad’s .bind
, or
>>=
.
The most common use for ReaderT
is to provide environment information to a
program. In drone-dynamic-agents
we need access to the user’s OAuth 2.0
Refresh Token to be able to contact Google. The obvious thing is to load the
RefreshTokens
from disk on startup, and make every method take a
RefreshToken
parameter. In fact, this is such a common requirement that Martin
Odersky has proposed implicit functions.
A better solution is for our program to have an algebra that provides the configuration when needed, e.g.
We have reinvented MonadReader
, the typeclass associated to ReaderT
, where
.ask
is the same as our .token
, and S
is RefreshToken
:
with the implementation
A law of MonadReader
is that the S
cannot change between invocations, i.e.
ask >> ask === ask
. For our usecase, this is to say that the configuration is
read once. If we decide later that we want to reload configuration every time we
need it, e.g. allowing us to change the token without restarting the
application, we can reintroduce ConfigReader
which has no such law.
In our OAuth 2.0 implementation we could first move the Monad
evidence onto the
methods:
and then refactor the refresh
parameter to be part of the Monad
Any parameter can be moved into the MonadReader
. This is of most value to
immediate callers when they simply want to thread through this information from
above. With ReaderT
, we can reserve implicit
parameter blocks entirely for
the use of typeclasses, reducing the mental burden of using Scala.
The other method in MonadReader
is .local
We can change S
and run a program fa
within that local context, returning to
the original S
. A use case for .local
is to generate a “stack trace” that
makes sense to our domain. giving us nested logging! Leaning on the Meta
data
structure from the previous section, we define a function to checkpoint:
and we can use it to wrap functions that operate in this context.
automatically passing through anything that is not explicitly traced. A compiler plugin or macro could do the opposite, opting everything in by default.
If we access .ask
we can see the breadcrumb trail of exactly how we were
called, without the distraction of bytecode implementation details. A
referentially transparent stacktrace!
A defensive programmer may wish to truncate the IList[Meta]
at a certain
length to avoid the equivalent of a stack overflow. Indeed, a more appropriate
data structure is Dequeue
.
.local
can also be used to keep track of contextual information that is
directly relevant to the task at hand, like the number of spaces that must
indent a line when pretty printing a human readable file format, bumping it by
two spaces when we enter a nested structure.
Finally, if we cannot request a MonadReader
because our application does not
provide one, we can always return a ReaderT
If a caller receives a ReaderT
, and they have the token
parameter to hand,
they can call access.run(token)
and get back an F[BearerToken]
.
Admittedly, since we don’t have many callers, we should just revert to a regular
function parameter. MonadReader
is of most use when:
- we may wish to refactor the code later to reload config
- the value is not needed by intermediate callers
- or, we want to locally scope some variable
Dotty can keep its implicit functions… we already have ReaderT
and
MonadReader
.
7.4.5 WriterT
The opposite to reading is writing. The WriterT
monad transformer is typically
for writing to a journal.
The wrapped type is F[(W, A)]
with the journal accumulated in W
.
There is not just one associated monad, but two! MonadTell
and MonadListen
MonadTell
is for writing to the journal and MonadListen
is to recover it.
The WriterT
implementation is
The most obvious example is to use MonadTell
for logging, or audit reporting.
Reusing Meta
from our error reporting we could imagine creating a log
structure like
and use Dequeue[Log]
as our journal type. We could change our OAuth2
authenticate
method to
We could even combine this with the ReaderT
traces and get structured logs.
The caller can recover the logs with .written
and do something with them.
However, there is a strong argument that logging deserves its own algebra. The log level is often needed at the point of creation for performance reasons and writing out the logs is typically managed at the application level rather than something each component needs to be concerned about.
The W
in WriterT
has a Monoid
, allowing us to journal any kind of
monoidic calculation as a secondary value along with our primary program. For
example, counting the number of times we do something, building up an
explanation of a calculation, or building up a TradeTemplate
for a new trade
while we price it.
A popular specialisation of WriterT
is when the monad is Id
, meaning the
underlying run
value is just a simple tuple (W, A)
.
which allows us to let any value carry around a secondary monoidal calculation,
without needing a context F[_]
.
In a nutshell, WriterT
/ MonadTell
is how to multi-task in FP.
7.4.6 StateT
StateT
lets us .put
, .get
and .modify
a value that is handled by the
monadic context. It is the FP replacement of var
.
If we were to write an impure method that has access to some mutable state, held
in a var
, it might have the signature () => F[A]
and return a different
value on every call, breaking referential transparency. With pure FP the
function takes the state as input and returns the updated state as output, which
is why the underlying type of StateT
is S => F[(S, A)]
.
The associated monad is MonadState
StateT
is implemented slightly differently than the monad transformers we have
studied so far. Instead of being a case class
it is an ADT with two members:
which are a specialised form of Trampoline
, giving us stack safety when we
want to recover the underlying data structure, .run
:
StateT
can straightforwardly implement MonadState
with its ADT:
With .pure
mirrored on the companion as .stateT
:
and MonadTrans.liftM
providing the F[A] => StateT[F, S, A]
constructor as
usual.
A common variant of StateT
is when F = Id
, giving the underlying type
signature S => (S, A)
. Scalaz provides a type alias and convenience functions
for interacting with the State
monad transformer directly, and mirroring
MonadState
:
For an example we can return to the business logic tests of
drone-dynamic-agents
. Recall from Chapter 3 that we created Mutable
as test
interpreters for our application and we stored the number of started
and
stoped
nodes in var
.
We now know that we can write a much better test simulator with State
. We will
take the opportunity to upgrade the accuracy of the simulation at the same time.
Recall that a core domain object is our application’s view of the world:
Since we’re writing a simulation of the world for our tests, we can create a data type that captures the ground truth of everything
The key difference being that the started
and stopped
nodes can be separated
out. Our interpreter can be implemented in terms of State[World, a]
and we can
write our tests to assert on what both the World
and WorldView
looks like
after the business logic has run.
The interpreters, which are mocking out contacting external Drone and Google services, may be implemented like this:
and we can rewrite our tests to follow a convention where:
-
world1
is the state of the world before running the program -
view1
is the application’s belief about the world -
world2
is the state of the world after running the program -
view2
is the application’s belief after running the program
For example,
We would be forgiven for looking back to our business logic loop
and use StateT
to manage the state
. However, our DynAgents
business logic
requires only Applicative
and we would be violating the Rule of Least Power
to require the more powerful MonadState
. It is therefore entirely reasonable
to handle the state manually by passing it in to update
and act
, and let
whoever calls us use a StateT
if they wish.
7.4.7 IndexedStateT
The code that we have studied thus far is not how Scalaz implements StateT
.
Instead, a type alias points to IndexedStateT
The implementation of IndexedStateT
is much as we have studied, with an extra
type parameter allowing the input state S1
and output state S2
to differ:
IndexedStateT
does not have a MonadState
when S1 != S2
, although it has a
Monad
.
The following example is adapted from Index your State by Vincent Marquez.
Consider the scenario where we must design an algebraic interface for an Int
to String
lookup. This may have a networked implementation and the order of
calls is essential. Our first attempt at the API may look something like:
with runtime errors if .update
or .commit
is called without a .lock
. A
more complex design may involve multiple traits and a custom DSL that nobody
remembers how to use.
Instead, we can use IndexedStateT
to require that the caller is in the correct
state. First we define our possible states as an ADT
and then revisit our algebra
which will give a compiletime error if we try to .update
without a .lock
but allowing us to construct functions that can be composed by explicitly including their state:
7.4.8 IndexedReaderWriterStateT
Those wanting to have a combination of ReaderT
, WriterT
and IndexedStateT
will not be disappointed. The transformer IndexedReaderWriterStateT
wraps (R,
S1) => F[(W, A, S2)]
with R
having Reader
semantics, W
for monoidic
writes, and the S
parameters for indexed state updates.
Abbreviations are provided because otherwise, let’s be honest, these types are so long they look like they are part of a J2EE API:
IRWST
is a more efficient implementation than a manually created transformer
stack of ReaderT[WriterT[IndexedStateT[F, ...], ...], ...]
.
7.4.9 TheseT
TheseT
allows errors to either abort the calculation or to be accumulated if
there is some partial success. Hence keep calm and carry on.
The underlying data type is F[A \&/ B]
with A
being the error type,
requiring a Semigroup
to enable the accumulation of errors.
There is no special monad associated with TheseT
, it is just a regular
Monad
. If we wish to abort a calculation we can return a This
value, but we
accumulate errors when we return a Both
which also contains a successful part
of the calculation.
TheseT
can also be thought of from a different angle: A
does not need to be
an error. Similarly to WriterT
, the A
may be a secondary calculation that
we are computing along with the primary calculation B
. TheseT
allows early
exit when something special about A
demands it, like when Charlie Bucket found
the last golden ticket (A
) he threw away his chocolate bar (B
).
7.4.10 ContT
Continuation Passing Style (CPS) is a style of programming where functions never return, instead continuing to the next computation. CPS is popular in Javascript and Lisp as they allow non-blocking I/O via callbacks when data is available. A direct translation of the pattern into impure Scala looks like
We can make this pure by introducing an F[_]
context
and refactor to return a function for the provided input
ContT
is just a container for this signature, with a Monad
instance
and convenient syntax to create a ContT
from a monadic value:
However, the simple callback use of continuations brings nothing to pure
functional programming because we already know how to sequence non-blocking,
potentially distributed, computations: that is what Monad
is for and we can do
this with .bind
or a Kleisli
arrow. To see why continuations are useful we
need to consider a more complex example under a rigid design constraint.
7.4.10.1 Control Flow
Say we have modularised our application into components that can perform I/O, with each component owned by a different development team:
Our goal is to produce an A0
given an A1
. Whereas Javascript and Lisp would
reach for continuations to solve this problem (because the I/O could block) we
can just chain the functions
We can lift .simple
into its continuation form by using the convenient .cps
syntax and a little bit of extra boilerplate for each step:
So what does this buy us? Firstly, it is worth noting that the control flow of this application is left to right
What if we are the authors of foo2
and we want to post-process the a0
that
we receive from the right (downstream), i.e. we want to split our foo2
into
foo2a
and foo2b
Add the constraint that we cannot change the definition of flow
or bar0
.
Perhaps it is not our code and is defined by the framework we are using.
It is not possible to process the output of a0
by modifying any of the
remaining barX
methods. However, with ContT
we can modify foo2
to process
the result of the next
continuation:
Which can be defined with
We are not limited to .map
over the return value, we can .bind
into another
control flow turning the linear flow into a graph!
Or we can stay within the original flow and retry everything downstream
This is just one retry, not an infinite loop. For example, we might want downstream to reconfirm a potentially dangerous action.
Finally, we can perform actions that are specific to the context of the ContT
,
in this case IO
which lets us do error handling and resource cleanup:
7.4.10.2 When to Order Spaghetti
It is not an accident that these diagrams look like spaghetti, that is just what
happens when we start messing with control flow. All the mechanisms we’ve
discussed in this section are simple to implement directly if we can edit the
definition of flow
, therefore we do not typically need to use ContT
.
However, if we are designing a framework, we should consider exposing the plugin
system as ContT
callbacks to allow our users more power over their control
flow. Sometimes the customer just really wants the spaghetti.
For example, if the Scala compiler was written using CPS, it would allow for a principled approach to communication between compiler phases. A compiler plugin would be able to perform some action based on the inferred type of an expression, computed at a later stage in the compile. Similarly, continuations would be a good API for an extensible build tool or text editor.
A caveat with ContT
is that it is not stack safe, so cannot be used for
programs that run forever.
7.4.10.3 Great, kid. Don’t get ContT
.
A more complex variant of ContT
called IndexedContT
wraps (A => F[B]) =>
F[C]
. The new type parameter C
allows the return type of the entire
computation to be different to the return type between each component. But if
B
is not equal to C
then there is no Monad
.
Not missing an opportunity to generalise as much as possible, IndexedContT
is
actually implemented in terms of an even more general structure (note the extra
s
before the T
)
where W[_]
has a Comonad
, and ContT
is actually implemented as a type
alias. Companion objects exist for these type aliases with convenient
constructors.
Admittedly, five type parameters is perhaps a generalisation too far. But then again, over-generalisation is consistent with the sensibilities of continuations.
7.4.11 Transformer Stacks and Ambiguous Implicits
This concludes our tour of the monad transformers in Scalaz.
When multiple transformers are combined, we call this a transformer stack and
although it is verbose, it is possible to read off the features by reading the
transformers. For example if we construct an F[_]
context which is a set of
composed transformers, such as
we know that we are adding error handling with error type E
(there is a
MonadError[Ctx, E]
) and we are managing state S
(there is a MonadState[Ctx,
S]
).
But there are unfortunately practical drawbacks to using monad transformers and
their companion Monad
typeclasses:
- Multiple implicit
Monad
parameters mean that the compiler cannot find the correct syntax to use for the context. - Monads do not compose in the general case, which means that the order of nesting of the transformers is important.
- All the interpreters must be lifted into the common context. For example, we
might have an implementation of some algebra that uses for
IO
and now we need to wrap it withStateT
andEitherT
even though they are unused inside the interpreter. - There is a performance cost associated to each layer. And some monad
transformers are worse than others.
StateT
is particularly bad but evenEitherT
can cause memory allocation problems for high throughput applications.
We need to talk about workarounds.
7.4.11.1 No Syntax
Say we have an algebra
and some data types
that we want to use in our business logic
The first problem we encounter is that this fails to compile
There are some tactical solutions to this problem. The most obvious is to make all the parameters explicit
and require only Monad
to be passed implicitly via context bounds. However,
this means that we must manually wire up the MonadError
and MonadState
when
calling foo1
and when calling out to another method that requires an
implicit
.
A second solution is to leave the parameters implicit
and use name shadowing
to make all but one of the parameters explicit. This allows upstream to use
implicit resolution when calling us but we still need to pass parameters
explicitly if we call out.
or we could shadow just one Monad
, leaving the other one to provide our syntax
and to be available for when we call out to other methods
A third option, with a higher up-front cost, is to create a custom Monad
typeclass that holds implicit
references to the two Monad
classes that we
care about
and a derivation of the typeclass given a MonadError
and MonadState
Now if we want access to S
or E
we get them via F.S
or F.E
Like the second solution, we can choose one of the Monad
instances to be
implicit
within the block, achieved by importing it
7.4.11.2 Composing Transformers
An EitherT[StateT[...], ...]
has a MonadError
but does not have a
MonadState
, whereas StateT[EitherT[...], ...]
can provide both.
The workaround is to study the implicit derivations on the companion of the transformers and to make sure that the outer most transformer provides everything we need.
A rule of thumb is that more complex transformers go on the outside, with this chapter presenting transformers in increasing order of complex.
7.4.11.3 Lifting Interpreters
Continuing the same example, let’s say our Lookup
algebra has an IO
interpreter
but we want our context to be
to give us a MonadError
and a MonadState
. This means we need to wrap
LookupRandom
to operate over Ctx
.
Firstly, we want to make use of the .liftM
syntax on Monad
, which uses
MonadTrans
to lift from our starting F[A]
into G[F, A]
It is important to realise that the type parameters to .liftM
have two type
holes, one of shape _[_]
and another of shape _
. If we create type aliases
of this shape
We can abstract over MonadTrans
to lift a Lookup[F]
to any Lookup[G[F, ?]]
where G
is a Monad Transformer:
Allowing us to wrap once for EitherT
, and then again for StateT
Another way to achieve this, in a single step, is to use MonadIO
which enables
lifting an IO
into a transformer stack:
with MonadIO
instances for all the common combinations of transformers.
The boilerplate overhead to lift an IO
interpreter to anything with a
MonadIO
instance is therefore two lines of code (for the interpreter
definition), plus one line per element of the algebra, and a final line to call
it:
7.4.11.4 Performance
The biggest problem with Monad Transformers is their performance overhead.
EitherT
has a reasonably low overhead, with every .flatMap
call generating a
handful of objects, but this can impact high throughput applications where every
object allocation matters. Other transformers, such as StateT
, effectively add
a trampoline, and ContT
keeps the entire call-chain retained in memory.
If performance becomes a problem, the solution is to not use Monad Transformers.
At least not the transformer data structures. A big advantage of the Monad
typeclasses, like MonadState
is that we can create an optimised F[_]
for our
application that provides the typeclasses naturally. We will learn how to create
an optimal F[_]
over the next two chapters, when we deep dive into two
structures which we have already seen: Free
and IO
.
7.5 A Free Lunch
Our industry craves safe high-level languages, trading developer efficiency and reliability for reduced runtime performance.
The Just In Time (JIT) compiler on the JVM performs so well that simple functions can have comparable performance to their C or C++ equivalents, ignoring the cost of garbage collection. However, the JIT only performs low level optimisations: branch prediction, inlining methods, unrolling loops, and so on.
The JIT does not perform optimisations of our business logic, for example batching network calls or parallelising independent tasks. The developer is responsible for writing the business logic and optimisations at the same time, reducing readability and making it harder to maintain. It would be good if optimisation was a tangential concern.
If instead, we have a data structure that describes our business logic in terms of high level concepts, not machine instructions, we can perform high level optimisation. Data structures of this nature are typically called Free structures and can be generated for free for the members of the algebraic interfaces of our program. For example, a Free Applicative can be generated that allows us to batch or de-duplicate expensive network I/O.
In this section we will learn how to create free structures, and how they can be used.
7.5.1 Free
(Monad
)
Fundamentally, a monad describes a sequential program where every step depends on the previous one. We are therefore limited to modifications that only know about things that we’ve already run and the next thing we are going to run.
As a refresher, Free
is the data structure representation of a Monad
and is
defined by three members
-
Suspend
represents a program that has not yet been interpreted -
Return
is.pure
-
Gosub
is.bind
A Free[S, A]
can be freely generated for any algebra S
. To make this
explicit, consider our application’s Machines
algebra
We define a freely generated Free
for Machines
by creating an ADT with a
data type for each element of the algebra. Each data type has the same input
parameters as its corresponding element, is parameterised over the return type,
and has the same name:
The ADT defines an Abstract Syntax Tree (AST) because each member is representing a computation in a program.
We then define .liftF
, an implementation of Machines
, with Free[Ast, ?]
as
the context. Every method simply delegates to Free.liftT
to create a Suspend
When we construct our program, parameterised over a Free
, we run it by
providing an interpreter (a natural transformation Ast ~> M
) to the
.foldMap
method. For example, if we could provide an interpreter that maps to
IO
we can construct an IO[Unit]
program via the free AST
For completeness, an interpreter that delegates to a direct implementation is
easy to write. This might be useful if the rest of the application is using
Free
as the context and we already have an IO
implementation that we want to
use:
But our business logic needs more than just Machines
, we also need access to
the Drone
algebra, recall defined as
What we want is for our AST to be a combination of the Machines
and Drone
ASTs. We studied Coproduct
in Chapter 6, a higher kinded disjunction:
We can use the context Free[Coproduct[Machines.Ast, Drone.Ast, ?], ?]
.
We could manually create the coproduct but we would be swimming in boilerplate, and we’d have to do it all again if we wanted to add a third algebra.
The scalaz.Inject
typeclass helps:
The implicit
derivations generate Inject
instances when we need them,
letting us rewrite our liftF
to work for any combination of ASTs:
It is nice that F :<: G
reads as if our Ast
is a member of the complete F
instruction set: this syntax is intentional.
Putting it all together, lets say we have a program that we wrote abstracting over Monad
and we have some existing implementations of Machines
and Drone
, we can
create interpreters from them:
and combine them into the larger instruction set using a convenience method from
the NaturalTransformation
companion
Then use it to produce an IO
But we’ve gone in circles! We could have used IO
as the context for our
program in the first place and avoided Free
. So why did we put ourselves
through all this pain? Here are some examples of where Free
might be useful.
7.5.1.1 Testing: Mocks and Stubs
It might sound hypocritical to propose that Free
can be used to reduce
boilerplate, given how much code we have written. However, there is a tipping
point where the Ast
pays for itself when we have many tests that require stub
implementations.
If the .Ast
and .liftF
is defined for an algebra, we can create partial
interpreters
which can be used to test our program
By using partial functions, and not total functions, we are exposing ourselves to runtime errors. Many teams are happy to accept this risk in their unit tests since the test would fail if there is a programmer error.
Arguably we could also achieve the same thing with implementations of our
algebras that implement every method with ???
, overriding what we need on a
case by case basis.
7.5.1.2 Monitoring
It is typical for server applications to be monitored by runtime agents that manipulate bytecode to insert profilers and extract various kinds of usage or performance information.
If our application’s context is Free
, we do not need to resort to bytecode
manipulation, we can instead implement a side-effecting monitor as an
interpreter that we have complete control over.
For example, consider using this Ast ~> Ast
“agent”
which records method invocations: we would use a vendor-specific routine in real code. We could also watch for specific messages of interest and log them as a debugging aid.
We can attach Monitor
to our production Free
application with
or combine the natural transformations and run with a single
7.5.1.3 Monkey Patching
As engineers, we are used to requests for bizarre workarounds to be added to the core logic of the application. We might want to codify such corner cases as exceptions to the rule and handle them tangentially to our core logic.
For example, suppose we get a memo from accounting telling us
URGENT: Bob is using node
#c0ffee
to run the year end. DO NOT STOP THIS MACHINE!1!
There is no possibility to discuss why Bob shouldn’t be using our machines for his super-important accounts, so we have to hack our business logic and put out a release to production as soon as possible.
Our monkey patch can map into a Free
structure, allowing us to return a
pre-canned result (Free.pure
) instead of scheduling the instruction. We
special case the instruction in a custom natural transformation with its return
value:
eyeball that it works, push it to prod, and set an alarm for next week to remind us to remove it, and revoke Bob’s access to our servers.
Our unit test could use State
as the target context, so we can keep track of
all the nodes we stopped:
along with a test that “normal” nodes are not affected.
An advantage of using Free
to avoid stopping the #c0ffee
nodes is that we
can be sure to catch all the usages instead of having to go through the business
logic and look for all usages of .stop
. If our application context is just an
IO
we could, of course, implement this logic in the Machines[IO]
implementation but an advantage of using Free
is that we don’t need to touch
the existing code and can instead isolate and test this (temporary) behaviour,
without being tied to the IO
implementations.
7.5.2 FreeAp
(Applicative
)
Despite this chapter being called Advanced Monads, the takeaway is: we
shouldn’t use monads unless we really really have to. In this section, we
will see why FreeAp
(free applicative) is preferable to Free
monads.
FreeAp
is defined as the data structure representation of the ap
and pure
methods from the Applicative
typeclass:
The methods .hoist
and .foldMap
are like their Free
analogues
.mapSuspension
and .foldMap
.
As a convenience, we can generate a Free[S, A]
from our FreeAp[S, A]
with
.monadic
. This is especially useful to optimise smaller Applicative
subsystems yet use them as part of a larger Free
program.
Like Free
, we must create a FreeAp
for our ASTs, more boilerplate…
7.5.2.1 Batching Network Calls
We opened this chapter with grand claims about performance. Time to deliver.
Philip Stark’s Humanised version of Peter Norvig’s Latency Numbers serve as motivation for why we should focus on reducing network calls to optimise an application:
Computer | Human Timescale | Human Analogy |
---|---|---|
L1 cache reference | 0.5 secs | One heart beat |
Branch mispredict | 5 secs | Yawn |
L2 cache reference | 7 secs | Long yawn |
Mutex lock/unlock | 25 secs | Making a cup of tea |
Main memory reference | 100 secs | Brushing your teeth |
Compress 1K bytes with Zippy | 50 min | Scala compiler CI pipeline |
Send 2K bytes over 1Gbps network | 5.5 hr | Train London to Edinburgh |
SSD random read | 1.7 days | Weekend |
Read 1MB sequentially from memory | 2.9 days | Long weekend |
Round trip within same datacenter | 5.8 days | Long US Vacation |
Read 1MB sequentially from SSD | 11.6 days | Short EU Holiday |
Disk seek | 16.5 weeks | Term of university |
Read 1MB sequentially from disk | 7.8 months | Fully paid maternity in Norway |
Send packet CA->Netherlands->CA | 4.8 years | Government’s term |
Although Free
and FreeAp
incur a memory allocation overhead, the equivalent
of 100 seconds in the humanised chart, every time we can turn two sequential
network calls into one batch call, we save nearly 5 years.
When we are in a Applicative
context, we can safely optimise our application
without breaking any of the expectations of the original program, and without
cluttering the business logic.
Luckily, our main business logic only requires an Applicative
, recall
To begin, we create the lift
boilerplate for a new Batch
algebra
and then we will create an instance of DynAgentsModule
with FreeAp
as the context
In Chapter 6, we studied the Const
data type, which allows us to analyse a
program. It should not be surprising that FreeAp.analyze
is implemented in
terms of Const
:
We provide a natural transformation to record all node starts and .analyze
our
program to get all the nodes that need to be started:
The next step is to extend the instruction set from Orig
to Extended
, which
includes the Batch.Ast
and write a FreeAp
program that starts all our
gathered
nodes in a single network call
We also need to remove all the calls to Machines.Start
, which we can do with a natural transformation
Now we have two programs, and need to combine them. Recall the *>
syntax from
Apply
Putting it all together under a single method:
That Is it! We .optimise
every time we call act
in our main loop, which is
just a matter of plumbing.
7.5.3 Coyoneda
(Functor
)
Named after mathematician Nobuo Yoneda, we can freely generate a Functor
data
structure for any algebra S[_]
and there is also a contravariant version
The API is somewhat simpler than Free
and FreeAp
, allowing a natural
transformation with .trans
and a .run
(taking an actual Functor
or
Contravariant
, respectively) to escape the free structure.
Coyo and cocoyo can be a useful utility if we want to .map
or .contramap
over a type, and we know that we can convert into a data type that has a Functor
but we don’t want to commit to the final data structure too early. For example,
we create a Coyoneda[ISet, ?]
(recall ISet
does not have a Functor
) to use
methods that require a Functor
, then convert into IList
later on.
If we want to optimise a program with coyo or cocoyo we have to provide the expected boilerplate for each algebra:
An optimisation we get by using Coyoneda
is map fusion (and contramap
fusion), which allows us to rewrite
into
avoiding intermediate representations. For example, if xs
is a List
of a
thousand elements, we save two thousand object allocations because we only map
over the data structure once.
However it is arguably a lot easier to just make this kind of change in the
original function by hand, or to wait for the scalaz-plugin
project to be
released and automatically perform these sorts of optimisations.
7.5.4 Extensible Effects
Programs are just data: free structures help to make this explicit and give us the ability to rearrange and optimise that data.
Free
is more special than it appears: it can sequence arbitrary algebras and
typeclasses.
For example, a free structure for MonadState
is available. The Ast
and
.liftF
are more complicated than usual because we have to account for the S
type parameter on MonadState
, and the inheritance from Monad
:
This gives us the opportunity to use optimised interpreters. For example, we
could store the S
in an atomic field instead of building up a nested StateT
trampoline.
We can create an Ast
and .liftF
for almost any algebra or typeclass! The
only restriction is that the F[_]
does not appear as a parameter to any of the
instructions, i.e. it must be possible for the algebra to have an instance of
Functor
. This unfortunately rules out MonadError
and Monoid
.
As the AST of a free program grows, performance degrades because the interpreter
must match over instruction sets with an O(n)
cost. An alternative to
scalaz.Coproduct
is iotaz’s encoding, which uses an optimised data structure
to perform O(1)
dynamic dispatch (using integers that are assigned to each
coproduct at compiletime).
For historical reasons a free AST for an algebra or typeclass is called Initial
Encoding, and a direct implementation (e.g. with IO
) is called Finally
Tagless. Although we have explored interesting ideas with Free
, it is
generally accepted that finally tagless is superior. But to use finally tagless
style, we need a high performance effect type that provides all the monad
typeclasses we’ve covered in this chapter. We also still need to be able to run
our Applicative
code in parallel. This is exactly what we will cover next.
7.6 Parallel
There are two effectful operations that we almost always want to run in parallel:
-
.map
over a collection of effects, returning a single effect. This is achieved by.traverse
, which delegates to the effect’s.apply2
. - running a fixed number of effects with the scream operator
|@|
, and combining their output, again delegating to.apply2
.
However, in practice, neither of these operations execute in parallel by
default. The reason is that if our F[_]
is implemented by a Monad
, then the
derived combinator laws for .apply2
must be satisfied, which say
In other words, Monad
is explicitly forbidden from running effects in
parallel.
However, if we have an F[_]
that is not monadic, then it may implement
.apply2
in parallel. We can use the @@
(tag) mechanism to create an instance
of Applicative
for F[_] @@ Parallel
, which is conveniently assigned to the
type alias Applicative.Par
Monadic programs can then request an implicit Par
in addition to their Monad
Scalaz’s Traverse
syntax supports parallelism:
If the implicit Applicative.Par[IO]
is in scope, we can choose between
sequential and parallel traversal:
Similarly, we can call .parApply
or .parTupled
after using scream operators
It is worth noting that when we have Applicative
programs, such as
we can use F[A] @@ Parallel
as our program’s context and get parallelism as
the default on .traverse
and |@|
. Converting between the raw and @@
Parallel
versions of F[_]
must be handled manually in the glue code, which
can be painful. Therefore it is often easier to simply request both forms of
Applicative
7.6.1 Breaking the Law
We can take a more daring approach to parallelism: opt-out of the law that
.apply2
must be sequential for Monad
. This is highly controversial, but
works well for the majority of real world applications. We must first audit our
codebase (including third party dependencies) to ensure that nothing is making
use of the .apply2
implied law.
We wrap IO
and provide our own implementation of Monad
which runs .apply2
in parallel
by delegating to a @@ Parallel
instance
We can now use MyIO
as our application’s context instead of IO
, and get
parallelism by default.
For completeness: a naive and inefficient implementation of Applicative.Par
for our toy IO
could use Future
:
and due to a bug in the Scala compiler that treats all @@
instances as
orphans, we must explicitly import the implicit:
In the final section of this chapter we will see how Scalaz’s IO
is actually
implemented.
7.7 IO
Scalaz’s IO
is the fastest asynchronous programming construct in the Scala
ecosystem: up to 50 times faster than Future
. IO
is a free data structure
specialised for use as a general effect monad.
IO
has two type parameters: it has a Bifunctor
allowing the error type to
be an application specific ADT. But because we are on the JVM, and must interact
with legacy libraries, a convenient type alias is provided that uses exceptions
for the error type:
7.7.1 Creating
There are multiple ways to create an IO
that cover a variety of eager, lazy,
safe and unsafe code blocks:
with convenient Task
constructors:
The most common constructors, by far, when dealing with legacy code are
Task.apply
and Task.fromFuture
:
We cannot pass around raw Future
, because it eagerly evaluates, so must always
be constructed inside a safe block.
Note that the ExecutionContext
is not implicit
, contrary to the
convention. Recall that in Scalaz we reserve the implicit
keyword for
typeclass derivation, to simplify the language: ExecutionContext
is
configuration that must be provided explicitly.
7.7.2 Running
The IO
interpreter is called RTS
, for runtime system. Its implementation
is beyond the scope of this book. We will instead focus on the features that
IO
provides.
IO
is just a data structure, and is interpreted at the end of the world by
extending SafeApp
and implementing .run
If we are integrating with a legacy system and are not in control of the entry
point of our application, we can extend the RTS
and gain access to unsafe
methods to evaluate the IO
at the entry point to our principled FP code.
7.7.3 Features
IO
provides typeclass instances for Bifunctor
, MonadError[E, ?]
,
BindRec
, Plus
, MonadPlus
(if E
forms a Monoid
), and an
Applicative[IO.Par[E, ?]]
.
In addition to the functionality from the typeclasses, there are implementation specific methods:
It is possible for an IO
to be in a terminated state, which represents work
that is intended to be discarded (it is neither an error nor a success). The
utilities related to termination are:
7.7.4 Fiber
An IO
may spawn fibers, a lightweight abstraction over a JVM Thread
. We
can .fork
an IO
, and .supervise
any incomplete fibers to ensure that they
are terminated when the IO
action completes
When we have a Fiber
we can .join
back into the IO
, or interrupt
the
underlying work.
We can use fibers to achieve a form of optimistic concurrency control. Consider
the case where we have data
that we need to analyse, but we also need to
validate it. We can optimistically begin the analysis and cancel the work if the
validation fails, which is performed in parallel.
Another usecase for fibers is when we need to perform a fire and forget action. For example, low priority logging over a network.
7.7.5 Promise
A promise represents an asynchronous variable that can be set exactly once (with
complete
or error
). An unbounded number of listeners can get
the variable.
Promise
is not something that we typically use in application code. It is a
building block for high level concurrency frameworks.
7.7.6 IORef
IORef
is the IO
equivalent of an atomic mutable variable.
We can read the variable and we have a variety of ways to write or update it.
IORef
is another building block and can be used to provide a high performance
MonadState
. For example, create a newtype specialised to Task
We can make use of this optimised MonadState
implementation in a SafeApp
,
where our .program
depends on optimised MTL typeclasses:
A more realistic application would take a variety of algebras and typeclasses as input.
7.7.6.1 MonadIO
The MonadIO
that we previously studied was simplified to hide the E
parameter. The actual typeclass is
with a minor change to the boilerplate on the companion of our algebra,
accounting for the extra E
:
7.8 Summary
- The
Future
is broke, don’t go there. - Manage stack safety with a
Trampoline
. - The Monad Transformer Library (MTL) abstracts over common effects with typeclasses.
- Monad Transformers provide default implementations of the MTL.
-
Free
data structures let us analyse, optimise and easily test our programs. -
IO
gives us the ability to implement algebras as effects on the world. -
IO
can perform effects in parallel and is a high performance backbone for any application.
8. Typeclass Derivation
Typeclasses provide polymorphic functionality to our applications. But to use a typeclass we need instances for our business domain objects.
The creation of a typeclass instance from existing instances is known as typeclass derivation and is the topic of this chapter.
There are four approaches to typeclass derivation:
- Manual instances for every domain object. This is infeasible for real world
applications as it results in hundreds of lines of boilerplate for every line
of a
case class
. It is useful only for educational purposes and adhoc performance optimisations. - Abstract over the typeclass by an existing Scalaz typeclass. This is the
approach of
scalaz-deriving
, producing automated tests and derivations for products and coproducts - Macros. However, writing a macro for each typeclass requires an advanced and experienced developer. Fortunately, Jon Pretty’s Magnolia library abstracts over hand-rolled macros with a simple API, centralising the complex interaction with the compiler.
- Write a generic program using the Shapeless library. The
implicit
mechanism is a language within the Scala language and can be used to write programs at the type level.
In this chapter we will study increasingly complex typeclasses and their
derivations. We will begin with scalaz-deriving
as the most principled
mechanism, repeating some lessons from Chapter 5 “Scalaz Typeclasses”, then
Magnolia (the easiest to use), finishing with Shapeless (the most powerful) for
typeclasses with complex derivation logic.
8.1 Running Examples
This chapter will show how to define derivations for five specific typeclasses. Each example exhibits a feature that can be generalised:
8.2 scalaz-deriving
The scalaz-deriving
library is an extension to Scalaz and can be added to a
project’s build.sbt
with
providing new typeclasses, shown below in relation to core Scalaz typeclasses:
A recorded presentation of this chapter is available at https://www.youtube.com/watch?v=JmOFKdpuF9g
Before we proceed, here is a quick recap of the core Scalaz typeclasses:
8.2.1 Don’t Repeat Yourself
The simplest way to derive a typeclass is to reuse one that already exists.
The Equal
typeclass has an instance of Contravariant[Equal]
, providing
.contramap
:
As users of Equal
, we can use .contramap
for our single parameter data
types. Recall that typeclass instances go on the data type companions to be in
their implicit scope:
However, not all typeclasses can have an instance of Contravariant
. In
particular, typeclasses with type parameters in covariant position may have a
Functor
instead:
We can now derive a Default[Foo]
If a typeclass has parameters in both covariant and contravariant position, as
is the case with Semigroup
, it may provide an InvariantFunctor
and we can call .xmap
Generally, it is simpler to just use .xmap
instead of .map
or .contramap
:
8.2.2 MonadError
Typically things that write from a polymorphic value have a Contravariant
,
and things that read into a polymorphic value have a Functor
. However, it is
very much expected that reading can fail. For example, if we have a default
String
it does not mean that we can simply derive a default String Refined
NonEmpty
from it
fails to compile with
Recall from Chapter 4.1 that refineV
returns an Either
, as the compiler has
reminded us.
As the typeclass author of Default
, we can do better than Functor
and
provide a MonadError[Default, String]
:
Now we have access to .emap
syntax and can derive our refined type
In fact, we can provide a derivation rule for all refined types
where Validate
is from the refined library and is required by refineV
.
Similarly we can use .emap
to derive an Int
decoder from a Long
, with
protection around the non-total .toInt
stdlib method.
As authors of the Default
typeclass, we might want to reconsider our API
design so that it can never fail, e.g. with the following type signature
We would not be able to define a MonadError
, forcing us to provide instances
that always succeed. This will result in more boilerplate but gains compiletime
safety. However, we will continue with String \/ A
as the return type as it is
a more general example.
8.2.3 .fromIso
All of the typeclasses in Scalaz have a method on their companion with a signature similar to the following:
These mean that if we have a type F
, and a way to convert it into a G
that
has an instance, we can call Equal.fromIso
to obtain an instance for F
.
For example, as typeclass users, if we have a data type Bar
we can define an
isomorphism to (String, Int)
and then derive Equal[Bar]
because there is already an Equal
for all tuples:
The .fromIso
mechanism can also assist us as typeclass authors. Consider
Default
which has a core type signature of the form Unit => F[A]
. Our
default
method is in fact isomorphic to Kleisli[F, Unit, A]
, the ReaderT
monad transformer.
Since Kleisli
already provides a MonadError
(if F
has one), we can derive
MonadError[Default, String]
by creating an isomorphism between Default
and
Kleisli
:
giving us the .map
, .xmap
and .emap
that we’ve been making use of so far,
effectively for free.
8.2.4 Divisible
and Applicative
To derive the Equal
for our case class with two parameters, we reused the
instance that Scalaz provides for tuples. But where did the tuple instance come
from?
A more specific typeclass than Contravariant
is Divisible
. Equal
has an
instance:
And from divide2
, Divisible
is able to build up derivations all the way to
divide22
. We can call these methods directly for our data types:
The equivalent for type parameters in covariant position is Applicative
:
But we must be careful that we do not break the typeclass laws when we implement
Divisible
or Applicative
. In particular, it is easy to break the law of
composition which says that the following two codepaths must yield exactly the
same output
divide2(divide2(a1, a2)(dupe), a3)(dupe)
divide2(a1, divide2(a2, a3)(dupe))(dupe)
- for any
dupe: A => (A, A)
with similar laws for Applicative
.
Consider JsEncoder
and a proposed instance of Divisible
On one side of the composition laws, for a String
input, we get
and on the other
which are different. We could experiment with variations of the divide
implementation, but it will never satisfy the laws for all inputs.
We therefore cannot provide a Divisible[JsEncoder]
because it would break the
mathematical laws and invalidates all the assumptions that users of Divisible
rely upon.
To aid in testing laws, Scalaz typeclasses contain the codified versions of their laws on the typeclass itself. We can write an automated test, asserting that the law fails, to remind us of this fact:
On the other hand, a similar JsDecoder
test meets the Applicative
composition laws
for some test data
Now we are reasonably confident that our derived MonadError
is lawful.
However, just because we have a test that passes for a small set of data does not prove that the laws are satisfied. We must also reason through the implementation to convince ourselves that it should satisfy the laws, and try to propose corner cases where it could fail.
One way of generating a wide variety of test data is to use the scalacheck
library, which provides an Arbitrary
typeclass that integrates with most
testing frameworks to repeat a test with randomly generated data.
The jsonformat
library provides an Arbitrary[JsValue]
(everybody should
provide an Arbitrary
for their ADTs!) allowing us to make use of Scalatest’s
forAll
feature:
This test gives us even more confidence that our typeclass meets the
Applicative
composition laws. By checking all the laws on Divisible
and
MonadError
we also get a lot of smoke tests for free.
8.2.5 Decidable
and Alt
Where Divisible
and Applicative
give us typeclass derivation for products
(built from tuples), Decidable
and Alt
give us the coproducts (built from
nested disjunctions):
The four core typeclasses have symmetric signatures:
Typeclass | method | given | signature | returns |
---|---|---|---|---|
Applicative |
apply2 |
F[A1], F[A2] |
(A1, A2) => Z |
F[Z] |
Alt |
altly2 |
F[A1], F[A2] |
(A1 \/ A2) => Z |
F[Z] |
Divisible |
divide2 |
F[A1], F[A2] |
Z => (A1, A2) |
F[Z] |
Decidable |
choose2 |
F[A1], F[A2] |
Z => (A1 \/ A2) |
F[Z] |
supporting covariant products; covariant coproducts; contravariant products; contravariant coproducts.
We can write a Decidable[Equal]
, letting us derive Equal
for any ADT!
For an ADT
where the products (Vader
and JarJar
) have an Equal
we can derive the equal for the whole ADT
Typeclasses that have an Applicative
can be eligible for an Alt
. If we want
to use our Kleisli.iso
trick, we have to extend IsomorphismMonadError
and
mix in Alt
. Upgrade our MonadError[Default, String]
to have an
Alt[Default]
:
Letting us derive our Default[Darth]
Returning to the scalaz-deriving
typeclasses, the invariant parents of Alt
and Decidable
are:
supporting typeclasses with an InvariantFunctor
like Monoid
and Semigroup
.
8.2.6 Arbitrary Arity and @deriving
There are two problems with InvariantApplicative
and InvariantAlt
:
- they only support products of four fields and coproducts of four entries.
- there is a lot of boilerplate on the data type companions.
In this section we solve both problems with additional typeclasses introduced by
scalaz-deriving
Effectively, our four central typeclasses Applicative
, Divisible
, Alt
and
Decidable
all get extended to arbitrary arity using the iotaz library, hence
the z
postfix.
The iotaz library has three main types:
-
TList
which describes arbitrary length chains of types -
Prod[A <: TList]
for products -
Cop[A <: TList]
for coproducts
By way of example, a TList
representation of Darth
from the previous
section is
which can be instantiated:
To be able to use the scalaz-deriving
API, we need an Isomorphism
between
our ADTs and the iotaz
generic representation. It is a lot of boilerplate,
we will get to that in a moment:
With that out of the way we can call the Deriving
API for Equal
, possible
because scalaz-deriving
provides an optimised instance of Deriving[Equal]
To be able to do the same for our Default
typeclass, we need to provide an
instance of Deriving[Default]
. This is just a case of wrapping our existing
Alt
with a helper:
and then calling it from the companions
We have solved the problem of arbitrary arity, but we have introduced even more boilerplate.
The punchline is that the @deriving
annotation, which comes from
deriving-plugin
, generates all this boilerplate automatically and only needs
to be applied at the top level of an ADT:
Also included in scalaz-deriving
are instances for Order
, Semigroup
and
Monoid
. Instances of Show
and Arbitrary
are available by installing the
scalaz-deriving-magnolia
and scalaz-deriving-scalacheck
extras.
You’re welcome!
8.2.7 Examples
We finish our study of scalaz-deriving
with fully worked implementations of
all the example typeclasses. Before we do that we need to know about a new data
type: /~\
, aka the snake in the road, for containing two higher kinded
structures that share the same type parameter:
We typically use this in the context of Id /~\ TC
where TC
is our typeclass,
meaning that we have a value, and an instance of a typeclass for that value,
without knowing anything about the value.
In addition, all the methods on the Deriving
API have implicit evidence of the
form A PairedWith FA
, allowing the iotaz
library to be able to perform
.zip
, .traverse
, and other operations on Prod
and Cop
. We can ignore
these parameters, as we don’t use them directly.
8.2.7.1 Equal
As with Default
we could define a regular fixed-arity Decidable
and wrap it
with ExtendedInvariantAlt
(the simplest approach), but we choose to implement
Decidablez
directly for the performance benefit. We make two additional
optimisations:
- perform instance equality
.eq
before applying theEqual.equal
, allowing for shortcut equality between identical values. -
Foldable.all
allowing early exit when any comparison isfalse
. e.g. if the first fields don’t match, we don’t even request theEqual
for remaining values.
8.2.7.2 Default
Unfortunately, the iotaz
API for .traverse
(and its analogy, .coptraverse
)
requires us to define natural transformations, which have a clunky syntax, even
with the kind-projector
plugin.
8.2.7.3 Semigroup
It is not possible to define a Semigroup
for general coproducts, however it is
possible to define one for general products. We can use the arbitrary arity
InvariantApplicative
:
8.2.7.4 JsEncoder
and JsDecoder
scalaz-deriving
does not provide access to field names so it is not possible
to write a JSON encoder or decoder.
8.3 Magnolia
The Magnolia macro library provides a clean API for writing typeclass
derivations. It is installed with the following build.sbt
entry
A typeclass author implements the following members:
The Magnolia API is:
with helpers
The Monadic
typeclass, used in constructMonadic
, is automatically generated
if our data type has a .map
and .flatMap
method when we import mercator._
It does not make sense to use Magnolia for typeclasses that can be abstracted by
Divisible
, Decidable
, Applicative
or Alt
, since those abstractions
provide a lot of extra structure and tests for free. However, Magnolia offers
features that scalaz-deriving
cannot provide: access to field names, type
names, annotations and default values.
8.3.1 Example: JSON
We have some design choices to make with regards to JSON serialisation:
- Should we include fields with
null
values? - Should decoding treat missing vs
null
differently? - How do we encode the name of a coproduct?
- How do we deal with coproducts that are not
JsObject
?
We choose sensible defaults
- do not include fields if the value is a
JsNull
. - handle missing fields the same as
null
values. - use a special field
"type"
to disambiguate coproducts using the type name. - put primitive values into a special field
"xvalue"
.
and let the users attach an annotation to coproducts and product fields to customise their formats:
For example
Start with a JsEncoder
that handles only our sensible defaults:
We can see how the Magnolia API makes it easy to access field names and typeclasses for each parameter.
Now add support for annotations to handle user preferences. To avoid looking up the annotations on every encoding, we will cache them in an array. Although field access to an array is non-total, we are guaranteed that the indices will always align. Performance is usually the victim in the trade-off between specialisation and generalisation.
For the decoder we use .constructMonadic
which has a type signature similar to
.traverse
Again, adding support for user preferences and default field values, along with some optimisations:
We call the JsMagnoliaEncoder.gen
or JsMagnoliaDecoder.gen
method from the
companion of our data types. For example, the Google Maps API
Thankfully, the @deriving
annotation supports Magnolia! If the typeclass
author provides a file deriving.conf
with their jar, containing this text
the deriving-macro
will call the user-provided method:
8.3.2 Fully Automatic Derivation
Generating implicit
instances on the companion of the data type is
historically known as semi-auto derivation, in contrast to full-auto which
is when the .gen
is made implicit
Users can import these methods into their scope and get magical derivation at the point of use
This may sound tempting, as it involves the least amount of typing, but there are two caveats:
- the macro is invoked at every use site, i.e. every time we call
.toJson
. This slows down compilation and also produces more objects at runtime, which will impact runtime performance. - unexpected things may be derived.
The first caveat is self evident, but unexpected derivations manifests as subtle bugs. Consider what would happen for
if we forgot to provide an implicit derivation for Option
. We might expect a
Foo(Some("hello"))
to look like
But it would instead be
because Magnolia derived an Option
encoder for us.
This is confusing, we would rather have the compiler tell us if we forgot something. Full auto is therefore not recommended.
8.4 Shapeless
The Shapeless library is notoriously the most complicated library in Scala. The
reason why it has such a reputation is because it takes the implicit
language
feature to the extreme: creating a kind of generic programming language at the
level of the types.
This is not an entirely foreign concept: in Scalaz we try to limit our use of
the implicit
language feature to typeclasses, but we sometimes ask the
compiler to provide us with evidence relating types. For example Liskov or
Leibniz relationship (<~<
and ===
), and to Inject
a free algebra into a
scalaz.Coproduct
of algebras.
To install Shapeless, add the following to build.sbt
At the core of Shapeless are the HList
and Coproduct
data types
which are generic representations of products and coproducts, respectively.
The sealed trait HNil
is for convenience so we never need to type HNil.type
.
Shapeless has a clone of the IsoSet
datatype, called Generic
, which allows
us to move between an ADT and its generic representation:
Many of the types in Shapeless have a type member (Repr
) and an .Aux
type
alias on their companion that makes the second type visible. This allows us to
request the Generic[Foo]
for a type Foo
without having to provide the
generic representation, which is generated by a macro.
There is a complementary LabelledGeneric
that includes the field names
Note that the value of a LabelledGeneric
representation is the same as the
Generic
representation: field names only exist in the type and are erased at
runtime.
We never need to type KeyTag
manually, we use the type alias:
If we want to access the field name from a FieldType[K, A]
, we ask for
implicit evidence Witness.Aux[K]
, which allows us to access the value of K
at runtime.
Superficially, this is all we need to know about Shapeless to be able to derive a typeclass. However, things get increasingly complex, so we will proceed with increasingly complex examples.
8.4.1 Example: Equal
A typical pattern to follow is to extend the typeclass that we wish to derive, and put the Shapeless code on its companion. This gives us an implicit scope that the compiler can search without requiring complex imports
The entry point to a Shapeless derivation is a method, gen
, requiring two type
parameters: the A
that we are deriving and the R
for its generic
representation. We then ask for the Generic.Aux[A, R]
, relating A
to R
,
and an instance of the Derived
typeclass for the R
. We begin with this
signature and simple implementation:
We’ve reduced the problem to providing an implicit Equal[R]
for an R
that is
the Generic
representation of A
. First consider products, where R <:
HList
. This is the signature we want to implement:
because if we can implement it for a head and a tail, the compiler will be able
to recurse on this method until it reaches the end of the list. Where we will
need to provide an instance for the empty HNil
We implement these methods
and for coproducts we want to implement these signatures
.cnil
will never be called for a typeclass like Equal
with type parameters
only in contravariant position, but the compiler doesn’t know that so we have to
provide a stub:
For the coproduct case we can only compare two things if they align, which is
when they are both Inl
or Inr
It is noteworthy that our methods align with the concept of conquer
(hnil
),
divide2
(hlist
) and alt2
(coproduct
)! However, we don’t get any of the
advantages of implementing Decidable
, as now we must start from scratch when
writing tests for this code.
So let’s test this thing with a simple ADT
We need to provide instances on the companions:
But it doesn’t compile
Welcome to Shapeless compilation errors!
The problem, which is not at all evident from the error, is that the compiler is
unable to work out what R
is, and gets caught thinking it is something else.
We need to provide the explicit type parameters when calling gen
, e.g.
or we can use the Generic
macro to help us and let the compiler infer the generic representation
The reason why this fixes the problem is because the type signature
desugars into
The Scala compiler solves type constraints left to right, so it finds many
different solutions to DerivedEqual[R]
before constraining it with the
Generic.Aux[A, R]
. Another way to solve this is to not use context bounds.
With this in mind, we no longer need the implicit val generic
or the explicit
type parameters on the call to .gen
. We can wire up @deriving
by adding an
entry in deriving.conf
(assuming we want to override the scalaz-deriving
implementation)
and write
But replacing the scalaz-deriving
version means that compile times get slower.
This is because the compiler is solving N
implicit searches for each product
of N
fields or coproduct of N
products, whereas scalaz-deriving
and
Magnolia do not.
Note that when using scalaz-deriving
or Magnolia we can put the @deriving
on
just the top member of an ADT, but for Shapeless we must add it to all entries.
However, this implementation still has a bug: it fails for recursive types at runtime, e.g.
The reason why this happens is because Equal[Tree]
depends on the
Equal[Branch]
, which depends on the Equal[Tree]
. Recursion and BANG!
It must be loaded lazily, not eagerly.
Both scalaz-deriving
and Magnolia deal with lazy automatically, but in
Shapeless it is the responsibility of the typeclass author.
The macro types Cached
, Strict
and Lazy
modify the compiler’s type
inference behaviour allowing us to achieve the laziness we require. The pattern
to follow is to use Cached[Strict[_]]
on the entry point and Lazy[_]
around
the H
instances.
It is best to depart from context bounds and SAM types entirely at this point:
While we were at it, we optimised using the quick
shortcut from
scalaz-deriving
.
We can now call
without a runtime exception.
8.4.2 Example: Default
There are no new snares in the implementation of a typeclass with a type
parameter in covariant position. Here we create HList
and Coproduct
values,
and must provide a value for the CNil
case as it corresponds to the case where
no coproduct is able to provide a value.
Much as we could draw an analogy between Equal
and Decidable
, we can see the
relationship to Alt
in .point
(hnil
), .apply2
(.hcons
) and .altly2
(.ccons
).
There is little to be learned from an example like Semigroup
, so we will skip
to encoders and decoders.
8.4.3 Example: JsEncoder
To be able to reproduce our Magnolia JSON encoder, we must be able to access:
- field names and class names
- annotations for user preferences
- default values on a
case class
We will begin by creating an encoder that handles only the sensible defaults.
To get field names, we use LabelledGeneric
instead of Generic
, and when
defining the type of the head element, use FieldType[K, H]
instead of just
H
. A Witness.Aux[K]
provides the value of the field name at runtime.
All of our methods are going to return JsObject
, so rather than returning a
JsValue
we can specialise and create DerivedJsEncoder
that has a different
type signature to JsEncoder
.
Shapeless selects codepaths at compiletime based on the presence of annotations, which can lead to more optimised code, at the expense of code repetition. This means that the number of annotations we are dealing with, and their subtypes, must be manageable or we can find ourselves writing 10x the amount of code. We change our three annotations into one containing all the customisation parameters:
All users of the annotation must provide all three values since default values and convenience methods are not available to annotation constructors. We can write custom extractors so we don’t have to change our Magnolia code
We can request Annotation[json, A]
for a case class
or sealed trait
to get access to the annotation, but we must write an hcons
and a ccons
dealing with both cases because the evidence will not be generated if the annotation is not present. We therefore have to introduce a lower priority implicit scope and put the “no annotation” evidence there.
We can also request Annotations.Aux[json, A, J]
evidence to obtain an HList
of the json
annotation for type A
. Again, we must provide hcons
and
ccons
dealing with the case where there is and is not an annotation.
To support this one annotation, we must write four times as much code as before!
Lets start by rewriting the JsEncoder
, only handling user code that doesn’t
have any annotations. Now any code that uses the @json
will fail to compile,
which is a good safety net.
We must add an A
and J
type to the DerivedJsEncoder
and thread through the
annotations on its .toJsObject
method. Our .hcons
and .ccons
evidence now
provides instances for DerivedJsEncoder
with a None.type
annotation and we
move them to a lower priority so that we can deal with Annotation[json, A]
in
the higher priority.
Note that the evidence for J
is listed before R
. This is important, since
the compiler must first fix the type of J
before it can solve for R
.
Now we can add the type signatures for the six new methods, covering all the possibilities of where the annotation can be. Note that we only support one annotation in each position. If the user provides multiple annotations, anything after the first will be silently ignored.
We’re now running out of names for things, so we will arbitrarily call it
Annotated
when there is an annotation on the A
, and Custom
when there is
an annotation on a field:
We don’t actually need .hconsAnnotated
or .hconsAnnotatedCustom
for
anything, since an annotation on a case class
does not mean anything to the
encoding of that product, it is only used in .cconsAnnotated*
. We can therefore
delete two methods.
.cconsAnnotated
and .cconsAnnotatedCustom
can be defined as
and
The use of .head
and .get
may be concerned but recall that the types here
are ::
and Some
meaning that these methods are total and safe to use.
.hconsCustom
and .cconsCustom
are written
and
Obviously, there is a lot of boilerplate, but looking closely one can see that each method is implemented as efficiently as possible with the information it has available: codepaths are selected at compiletime rather than runtime.
The performance obsessed may be able to refactor this code so all annotation
information is available in advance, rather than injected via the .toJsFields
method, with another layer of indirection. For absolute performance, we could
also treat each customisation as a separate annotation, but that would multiply
the amount of code we’ve written yet again, with additional cost to compilation
time on downstream users. Such optimisations are beyond the scope of this book,
but they are possible and people do them: the ability to shift work from runtime
to compiletime is one of the most appealing things about generic programming.
One more caveat that we need to be aware of: LabelledGeneric
is not compatible
with scalaz.@@
, but there is a workaround. Say we want to effectively ignore
tags so we add the following derivation rules to the companions of our encoder
and decoder
We would then expect to be able to derive a JsDecoder
for something like our
TradeTemplate
from Chapter 5
But we instead get a compiler error
The error message is as helpful as always. The workaround is to introduce evidence for H @@ Z
on the lower priority implicit scope, and then just call the code that the compiler should have found in the first place:
Thankfully, we only need to consider products, since coproducts cannot be tagged.
8.4.4 JsDecoder
The decoding side is much as we can expect based on previous examples. We can
construct an instance of a FieldType[K, H]
with the helper field[K](h: H)
.
Supporting only the sensible defaults means we write:
Adding user preferences via annotations follows the same route as
DerivedJsEncoder
and is mechanical, so left as an exercise to the reader.
One final thing is missing: case class
default values. We can request evidence
but a big problem is that we can no longer use the same derivation mechanism for
products and coproducts: the evidence is never created for coproducts.
The solution is quite drastic. We must split our DerivedJsDecoder
into
DerivedCoproductJsDecoder
and DerivedProductJsDecoder
. We will focus our
attention on the DerivedProductJsDecoder
, and while we are at it we will
use a Map
for faster field lookup:
We can request evidence of default values with Default.Aux[A, D]
and duplicate
all the methods to deal with the case where we do and do not have a default
value. However, Shapeless is merciful (for once) and provides
Default.AsOptions.Aux[A, D]
letting us handle defaults at runtime.
We must move the .hcons
and .hnil
methods onto the companion of the new
sealed typeclass, which can handle default values
We can no longer use @deriving
for products and coproducts: there can only be
one entry in the deriving.conf
file.
Oh, and don’t forget to add @@
support
8.4.5 Complicated Derivations
Shapeless allows for a lot more kinds of derivations than are possible with
scalaz-deriving
or Magnolia. As an example of an encoder / decoder that are
not possible with Magnolia, consider this XML model from xmlformat
Given the nature of XML it makes sense to have separate encoder / decoder pairs
for XChildren
and XString
content. We could provide a derivation for the
XChildren
with Shapeless but we want to special case fields based on the kind
of typeclass they have, as well as Option
fields. We could even require that
fields are annotated with their encoded name. In addition, when decoding we wish
to have different strategies for handling XML element bodies, which can be
multipart, depending on if our type has a Semigroup
, Monoid
or neither.
8.4.6 Example: UrlQueryWriter
Along similar lines as xmlformat
, our drone-dynamic-agents
application could
benefit from a typeclass derivation of the UrlQueryWriter
typeclass, which is
built out of UrlEncodedWriter
instances for each field entry. It does not
support coproducts:
It is reasonable to ask if these 30 lines are actually an improvement over the 8 lines for the 2 manual instances our application needs: a decision to be taken on a case by case basis.
For completeness, the UrlEncodedWriter
derivation can be written with Magnolia
8.4.7 The Dark Side of Derivation
“Beware fully automatic derivation. Anger, fear, aggression; the dark side of the derivation are they. Easily they flow, quick to join you in a fight. If once you start down the dark path, forever will it dominate your compiler, consume you it will.”
― an ancient Shapeless master
In addition to all the warnings about fully automatic derivation that were mentioned for Magnolia, Shapeless is much worse. Not only is fully automatic Shapeless derivation the most common cause of slow compiles, it is also a painful source of typeclass coherence bugs.
Fully automatic derivation is when the def gen
are implicit
such that a call
will recurse for all entries in the ADT. Because of the way that implicit scopes
work, an imported implicit def
will have a higher priority than custom
instances on companions, creating a source of typeclass decoherence. For
example, consider this code if our .gen
were implicit
We might expect the full-auto encoded form of Bar("hello")
to look like
because we have used xderiving
for Foo
. But it can instead be
Worse yet is when implicit methods are added to the companion of the typeclass, meaning that the typeclass is always derived at the point of use and users are unable opt out.
Fundamentally, when writing generic programs, implicits can be ignored by the compiler depending on scope, meaning that we lose the compiletime safety that was our motivation for programming at the type level in the first place!
Everything is much simpler in the light side, where implicit
is only used for
coherent, globally unique, typeclasses. Fear of boilerplate is the path to the
dark side. Fear leads to anger. Anger leads to hate. Hate leads to suffering.
8.5 Performance
There is no silver bullet when it comes to typeclass derivation. An axis to consider is performance: both at compiletime and runtime.
8.5.0.1 Compile Times
When it comes to compilation times, Shapeless is the outlier. It is not uncommon
to see a small project expand from a one second compile to a one minute compile.
To investigate compilation issues, we can profile our applications with the
scalac-profiling
plugin
It produces output that can generate a flame graph.
For a typical Shapeless derivation, we get a lively chart
almost the entire compile time is spent in implicit resolution. Note that this
also includes compiling the scalaz-deriving
, Magnolia and manual instances,
but the Shapeless computations dominate.
And this is when it works. If there is a problem with a shapeless derivation, the compiler can get stuck in an infinite loop and must be killed.
8.5.0.2 Runtime Performance
If we move to runtime performance, the answer is always it depends.
Assuming that the derivation logic has been written in an efficient way, it is only possible to know which is faster through experimentation.
The jsonformat
library uses the Java Microbenchmark Harness (JMH) on models
that map to GeoJSON, Google Maps, and Twitter, contributed by Andriy
Plokhotnyuk. There are three tests per model:
- encoding the
ADT
to aJsValue
- a successful decoding of the same
JsValue
back into an ADT - a failure decoding of a
JsValue
with a data error
applied to the following implementations:
- Magnolia
- Shapeless
- manually written
with the equivalent optimisations in each. The results are in operations per second (higher is better), on a powerful desktop computer, using a single thread:
We see that the manual implementations are in the lead, followed by Magnolia, with Shapeless from 30% to 70% the performance of the manual instances. Now for decoding
This is a tighter race for second place, with Shapeless and Magnolia keeping
pace. Finally, decoding from a JsValue
that contains invalid data (in an
intentionally awkward position)
Just when we thought we were seeing a pattern, both Magnolia and Shapeless win the race when decoding invalid GeoJSON data, but manual instances win the Google Maps and Twitter challenges.
We want to include scalaz-deriving
in the comparison, so we compare an
equivalent implementation of Equal
, tested on two values that contain the same
contents (True
) and two values that contain slightly different contents
(False
)
As expected, the manual instances are far ahead of the crowd, with Shapeless
mostly leading the automatic derivations. scalaz-deriving
makes a great effort
for GeoJSON but falls far behind in both the Google Maps and Twitter tests. The
False
tests are more of the same:
The runtime performance of scalaz-deriving
, Magnolia and Shapeless is usually
good enough. We should be realistic: we are not writing applications that need to
be able to encode more than 130,000 values to JSON, per second, on a single
core, on the JVM. If that is a problem, look into C++.
It is unlikely that derived instances will be an application’s bottleneck. Even if it is, there is the manually written escape hatch, which is more powerful and therefore more dangerous: it is easy to introduce typos, bugs, and even performance regressions by accident when writing a manual instance.
In conclusion: hokey derivations and ancient macros are no match for a good hand written instance at your side, kid.
8.6 Summary
When deciding on a technology to use for typeclass derivation, this feature chart may help:
Feature | Scalaz | Magnolia | Shapeless | Manual |
---|---|---|---|---|
@deriving |
yes | yes | yes | |
Laws | yes | |||
Fast compiles | yes | yes | yes | |
Field names | yes | yes | ||
Annotations | yes | partially | ||
Default values | yes | with caveats | ||
Complicated | painfully so | |||
Performance | hold my beer |
Prefer scalaz-deriving
if possible, using Magnolia for encoders / decoders or
if performance is a larger concern, escalating to Shapeless for complicated
derivations only if compilation times are not a concern.
Manual instances are always an escape hatch for special cases and to achieve the ultimate performance. Avoid introducing typo bugs with manual instances by using a code generation tool.
9. Wiring up the Application
To finish, we will apply what we have learnt to wire up the example application, and implement an HTTP client and server using the http4s pure FP library.
The source code to the drone-dynamic-agents
application is available along
with the book’s source code at https://github.com/fommil/fpmortals
under the
examples
folder. It is not necessary to be at a computer to read this chapter,
but many readers may prefer to explore the codebase in addition to this text.
Some parts of the application have been left unimplemented, as an exercise to
the reader. See the README
for further instructions.
9.1 Overview
Our main application only requires an implementation of the DynAgents
algebra.
We have an implementation already, DynAgentsModule
, which requires
implementations of the Drone
and Machines
algebras, which require a
JsonClient
, LocalClock
and OAuth2 algebras, etc, etc, etc.
It is helpful to get a complete picture of all the algebras, modules and interpreters of the application. This is the layout of the source code:
The signatures of all the algebras can be summarised as
Note that some signatures from previous chapters have been refactored to use Scalaz data types, now that we know why they are superior to the stdlib.
The data types are:
and the typeclasses are
We derive useful typeclasses using scalaz-deriving
and Magnolia. The
ConfigReader
typeclass is from the pureconfig
library and is used to read
runtime configuration from HOCON property files.
And without going into the detail of how to implement the algebras, we need to
know the dependency graph of our DynAgentsModule
.
There are two modules implementing OAuth2JsonClient
, one that will use the OAuth2 Refresh
algebra (for Google) and another that reuses a non-expiring BearerToken
(for Drone).
So far we have seen requirements for F
to have an Applicative[F]
, Monad[F]
and MonadState[F, BearerToken]
. All of these requirements can be satisfied by
using StateT[Task, BearerToken, ?]
as our application’s context.
However, some of our algebras only have one interpreter, using Task
But recall that our algebras can provide a liftM
on their companion, see
Chapter 7.4 on the Monad Transformer Library, allowing us to lift a
LocalClock[Task]
into our desired StateT[Task, BearerToken, ?]
context, and
everything is consistent.
Unfortunately, that is not the end of the story. Things get more complicated
when we go to the next layer. Our JsonClient
has an interpreter using a
different context
Note that the BlazeJsonClient
constructor returns a Task[JsonClient[F]]
, not
a JsonClient[F]
. This is because the act of creating the client is effectful:
mutable connection pools are created and managed internally by http4s.
We must not forget that we need to provide a RefreshToken
for
GoogleMachinesModule
. We could ask the user to do all the legwork, but we are
nice and provide a separate one-shot application that uses the Auth
and
Access
algebras. The AuthModule
and AccessModule
implementations bring in
additional dependencies, but thankfully no change to the application’s F[_]
context.
The interpreter for UserInteraction
is the most complex part of our codebase:
it starts an HTTP server, sends the user to visit a webpage in their browser,
captures a callback in the server, and then returns the result while safely
shutting down the web server.
Rather than using a StateT
to manage this state, we use a Promise
primitive
(from ioeffect
). We should always use Promise
(or IORef
) instead of a
StateT
when we are writing an IO
interpreter since it allows us to contain
the abstraction. If we were to use a StateT
, not only would it have a
performance impact on the entire application, but it would also leak internal
state management to the main application, which would become responsible for
providing the initial value. We also couldn’t use StateT
in this scenario
because we need “wait for” semantics that are only provided by Promise
.
9.2 Main
The ugliest part of FP is making sure that monads are all aligned and this tends
to happen in the Main
entrypoint.
Our main loop is
and the good news is that the actual code will look like
where F
holds the state of the world in a MonadState[F, WorldView]
. We can
put this into a method called .step
and repeat it forever by calling
.step[F].forever[Unit]
.
There are two approaches we can take, and we will explore both. The first, and
simplest, is to construct one monad stack that all algebras are compatible with.
Everything gets a .liftM
added to it to lift it into the larger stack.
The code we want to write for the one-shot authentication mode is
where .readConfig
and .putStrLn
are library calls. We can think of them as
Task
interpreters of algebras that read the application’s runtime
configuration and print a string to the screen.
But this code does not compile, for two reasons. Firstly, we need to consider
what our monad stack is going to be. The BlazeJsonClient
constructor returns a
Task
but the JsonClient
methods require a MonadError[...,
JsonClient.Error]
. This can be provided by EitherT
. We can therefore
construct the common monad stack for the entire for
comprehension as
Unfortunately this means we must .liftM
everything that returns a Task
,
which adds quite a lot of boilerplate. Unfortunately, the .liftM
method does
not take a type of shape H[_]
, it takes a type of shape H[_[_], _]
, so we
need to create a type alias to help out the compiler:
we can now call .liftM[HT]
when we receive a Task
But this still doesn’t compile, because clock
is a LocalClock[Task]
and AccessModule
requires a LocalClock[H]
. We simply add the necessary .liftM
boilerplate to the companion of LocalClock
and can then lift the entire algebra
and now everything compiles!
The second approach to wiring up an application is more complex, but necessary when there are conflicts in the monad stack, such as we need in our main loop. If we perform an analysis we find that the following are needed:
-
MonadError[F, JsonClient.Error]
for uses of theJsonClient
-
MonadState[F, BearerToken]
for uses of theOAuth2JsonClient
-
MonadState[F, WorldView]
for our main loop
Unfortunately, the two MonadState
requirements are in conflict. We could
construct a data type that captures all the state of the program, but that is a
leaky abstraction. Instead, we nest our for
comprehensions and provide state
where it is needed.
We now need to think about three layers, which we will call F
, G
, H
Now some bad news about .liftM
… it only works for one layer at a time. If we
have a Task[A]
and we want an F[A]
, we have to go through each step and type
ta.liftM[HT].liftM[GT].liftM[FT]
. Likewise, when lifting algebras we have to
call liftM
multiple times. To get a Sleep[F]
, we have to type
and to get a LocalClock[G]
we do two lifts
The main application then becomes
where the outer loop is using Task
, the middle loop is using G
, and the
inner loop is using F
.
The calls to .run(start)
and .eval(bearer)
are where we provide the initial
state for the StateT
parts of our application. The .run
is to reveal the
EitherT
error.
We can call these two application entry points from our SafeApp
and then run it!
Yay!
9.3 Blaze
We implement the HTTP client and server with the third party library http4s
.
The interpreters for their client and server algebras are called Blaze.
We need the following dependencies
9.3.1 BlazeJsonClient
We will need some imports
The Client
module can be summarised as
where Request
and Response
are data types:
made of
The EntityBody
type is an alias to Stream
from the fs2
library. The
Stream
data type can be thought of as an effectful, lazy, pull-based stream of
data. It is implemented as a Free
monad with exception catching and
interruption. Stream
takes two type parameters: an effect type and a content
type, and has an efficient internal representation for batching the data. For
example, although we are using Stream[F, Byte]
, it is actually wrapping the
raw Array[Byte]
that arrives over the network.
We need to convert our header and URL representations into the versions required by http4s:
Both our .get
and .post
methods require a conversion from the http4s
Response
type into an A
. We can factor this out into a single function,
.handler
The .through(fs2.text.utf8Decode)
is to convert a Stream[Task, Byte]
into a
Stream[Task, String]
, with .compile.foldMonoid
interpreting it with our
Task
and combining all the parts using the Monoid[String]
, giving us a
Task[String]
.
We then parse the string as JSON and use the JsDecoder[A]
to create the
required output.
This is our implementation of .get
.get
is all plumbing: we convert our input types into the http4s.Request
,
then call .fetch
on the Client
with our handler
. This gives us back a
Task[Error \/ A]
, but we need to return a F[A]
. Therefore we use the
MonadIO.liftIO
to create a F[Error \/ A]
and then .emap
to push the error
into the F
.
Unfortunately, if we try to compile this code it will fail. The error will look something like
Basically, something about a missing cat.
The reason for this failure is that http4s is using a different core FP library,
not Scalaz. Thankfully, scalaz-ioeffect
provides a compatibility layer and the
shims project provides seamless (until it isn’t) implicit conversions. We can
get our code to compile with these dependencies:
and these imports
The implementation of .post
is similar but we must also provide an instance of
Thankfully, the EntityEncoder
typeclass provides conveniences to let us derive
one from the existing String
encoder
The only difference between .get
and .post
is the way we construct our http4s.Request
and the final piece is the constructor, which is a case of calling Http1Client
with a configuration object
9.3.2 BlazeUserInteraction
We need to spin up an HTTP server, which is a lot easier than it sounds. First, the imports
We need to create a dsl
for our effect type, which we then import
Now we can use the http4s dsl to create HTTP endpoints. Rather than describe everything that can be done, we will simply implement the endpoint which is similar to any of other HTTP DSLs
The return type of each pattern match is a Task[Response[Task]]
. In our
implementation we want to take the code
and put it into the ptoken
promise:
but the definition of our services routes is not enough, we need to launch a
server, which we do with BlazeBuilder
Binding to port 0
makes the operating system assign an ephemeral port. We can
discover which port it is actually running on by querying the server.address
field.
Our implementation of the .start
and .stop
methods is now straightforward
The 1.second
sleep is necessary to avoid shutting down the server before the
response is sent back to the browser. IO doesn’t mess around when it comes to
concurrency performance!
Finally, to create a BlazeUserInteraction
, we just need the two uninitialised
promises
We could use IO[Void, ?]
instead, but since the rest of our application is
using Task
(i.e. IO[Throwable, ?]
), we .widenError
to avoid introducing
any boilerplate that would distract us.
9.4 Thank You
And that is it! Congratulations on reaching the end.
If you learnt something from this book, then please tell your friends. This book does not have a marketing department, so word of mouth is the only way that readers find out about it.
Get involved with Scalaz by joining the gitter chat room. From there you can ask for advice, help newcomers (you’re an expert now), and contribute to the next release.
Typeclass Cheatsheet
Typeclass | Method | From | Given | To |
---|---|---|---|---|
InvariantFunctor |
xmap |
F[A] |
A => B, B => A |
F[B] |
Contravariant |
contramap |
F[A] |
B => A |
F[B] |
Functor |
map |
F[A] |
A => B |
F[B] |
Apply |
ap / <*>
|
F[A] |
F[A => B] |
F[B] |
apply2 |
F[A], F[B] |
(A, B) => C |
F[C] |
|
Alt |
altly2 |
F[A], F[B] |
(A \/ B) => C |
F[C] |
Divide |
divide2 |
F[A], F[B] |
C => (A, B) |
F[C] |
Decidable |
choose2 |
F[A], F[B] |
C => (A \/ B) |
F[C] |
Bind |
bind / >>=
|
F[A] |
A => F[B] |
F[B] |
join |
F[F[A]] |
F[A] |
||
Cobind |
cobind |
F[A] |
F[A] => B |
F[B] |
cojoin |
F[A] |
F[F[A]] |
||
Applicative |
point |
A |
F[A] |
|
Divisible |
conquer |
F[A] |
||
Comonad |
copoint |
F[A] |
A |
|
Semigroup |
append |
A, A |
A |
|
Plus |
plus / <+>
|
F[A], F[A] |
F[A] |
|
MonadPlus |
withFilter |
F[A] |
A => Boolean |
F[A] |
Align |
align |
F[A], F[B] |
F[A \&/ B] |
|
merge |
F[A], F[A] |
F[A] |
||
Zip |
zip |
F[A], F[B] |
F[(A, B)] |
|
Unzip |
unzip |
F[(A, B)] |
(F[A], F[B]) |
|
Cozip |
cozip |
F[A \/ B] |
F[A] \/ F[B] |
|
Foldable |
foldMap |
F[A] |
A => B |
B |
foldMapM |
F[A] |
A => G[B] |
G[B] |
|
Traverse |
traverse |
F[A] |
A => G[B] |
G[F[B]] |
sequence |
F[G[A]] |
G[F[A]] |
||
Equal |
equal / ===
|
A, A |
Boolean |
|
Show |
shows |
A |
String |
|
Bifunctor |
bimap |
F[A, B] |
A => C, B => D |
F[C, D] |
leftMap |
F[A, B] |
A => C |
F[C, B] |
|
rightMap |
F[A, B] |
B => C |
F[A, C] |
|
Bifoldable |
bifoldMap |
F[A, B] |
A => C, B => C |
C |
(with MonadPlus ) |
separate |
F[G[A, B]] |
(F[A], F[B]) |
|
Bitraverse |
bitraverse |
F[A, B] |
A => G[C], B => G[D] |
G[F[C, D]] |
bisequence |
F[G[A], G[B]] |
G[F[A, B]] |
Haskell
Scalaz documentation often cites libraries or papers written in the Haskell programming language. In this short chapter, we will learn enough Haskell to be able to understand the source material, and to attend Haskell talks at functional programming conferences.
Data
Haskell has a very clean syntax for ADTs. This is a linked list structure:
List
is a type constructor, a
is the type parameter, |
separates the
data constructors, which are: Nil
the empty list and a Cons
cell. Cons
takes two parameters, which are separated by whitespace: no commas and no
parameter brackets.
There is no subtyping in Haskell, so there is no such thing as the Nil
type or
the Cons
type: both construct a List
.
Roughly translated to Scala:
i.e. the type constructor is like sealed abstract class
, and each data
constructor is .apply
/ .unapply
. Note that Scala does not perform
exhaustive pattern matches on this encoding, which is why Scalaz does not use
it.
We can use infix, a nicer definition might use the symbol :.
instead of Cons
where we specify a fixity, which can be infix
, infixl
or infixr
for no,
left, and right associativity, respectively. A number from 0 (loose) to 9
(tight) specifies precedence. We can now create a list of integers by typing
Haskell already comes with a linked list, which is so fundamental to functional
programming that it gets language-level square bracket syntax [a]
and a convenient multi-argument value constructor: [1, 2, 3]
instead of 1 :
2 : 3 : []
.
Ultimately our ADTs need to hold primitive values. The most common primitive data types are:
-
Char
a unicode character -
Text
for blocks of unicode text -
Int
a machine dependent, fixed precision signed integer -
Word
an unsignedInt
, and fixed sizeWord8
/Word16
/Word32
/Word64
-
Float
/Double
IEEE single and double precision numbers -
Integer
/Natural
arbitrary precision signed / non-negative integers -
(,)
tuples, from 0 (also known as unit) to 62 fields -
IO
the inspiration for Scalaz’sIO
, implemented in the runtime.
with honorary mentions for
Like Scala, Haskell has type aliases: an alias or its expanded form can be used
interchangeably. For legacy reasons, String
is defined as a linked list of
Char
which is very inefficient and we always want to use Text
instead.
Finally we can define field names on ADTs using record syntax, which means we contain the data constructors in curly brackets and use double colon type annotations to indicate the types
Note that the Human
data constructor and Resource
type do not have the same
name. Record syntax generates the equivalent of a field accessor and a copy
method.
A more efficient alternative to single field data
definitions is to use a
newtype
, which has no runtime overhead:
equivalent to extends AnyVal
but without the caveats.
Functions
Although not necessary, it is good practice to explicitly write the type
signature of a function: its name followed by its type. For example foldl
specialised for a linked list
All functions are curried in Haskell, each parameter is separated by a ->
and the final type is the return type. This is equivalent to the following Scala
signature:
Some observations:
- there is no keyword
- there is no need to declare the types that are introduced
- there is no need to name the parameters
which makes for terse code.
Infix functions are defined in parentheses and need a fixity definition:
Regular functions can be called in infix position by surrounding their name with backticks. The following are equivalent:
An infix function can be called like a regular function if we keep it surrounded by brackets, and can be curried on either the left or the right, often giving different semantics:
Functions are typically written with the most general parameter first, to enable maximum reuse of the curried forms.
The definition of a function may use pattern matching, with one line per case.
This is where we may name the parameters, using the data constructors to extract
parameters much like a Scala case
clause:
Underscores are a placeholder for ignored parameters and function names can be in infix position:
We can define anonymous lambda functions with a backslash, which looks like the Greek letter λ. The following are equivalent:
Pattern matched Haskell functions are just syntax sugar for nested lambda functions. Consider a simple function that creates a tuple when given three inputs:
The implementation
desugars into
In the body of a function we can create local value bindings with let
or
where
clauses. The following are equivalent definitions of map
for a linked
list (an apostrophe is a valid identifier name):
if
/ then
/ else
are keywords for conditional statements:
An alternative style is to use case guards
Pattern matching on any term is with case ... of
Guards can be used within matches. For example, say we want to special case zeros:
Finally, two functions that are worth noting are ($)
and (.)
Both of these functions are stylistic alternatives to nested parentheses.
The following are equivalent:
as are
There is a tendency to prefer function composition with .
instead of multiple
$
Typeclasses
To define a typeclass we use the class
keyword, followed by the name of the
typeclass, its type parameter, then the required members in a where
clause.
If there are dependencies between typeclasses, i.e. Applicative
requires a
Functor
to exist, we call this a constraint and use =>
notation:
We provide an implementation of a typeclass with the instance
keyword. If we
wish to repeat the type signature on instance functions, useful for clarity, we
must enable the InstanceSigs
language extension.
If we have a typeclass constraint in a function, we use the same =>
notation.
For example we can define something similar to Scalaz’s Apply.apply2
Since we have introduced Monad
, it is a good time to introduce do
notation,
which was the inspiration for Scala’s for
comprehensions:
desugars to
where >>=
is =<<
with parameters flipped
Unlike Scala, we do not need to bind unit values, or provide a yield
if we are
returning ()
. For example
translates to
Non-monadic values can be bound with the let
keyword:
Finally, Haskell has typeclass derivation with the deriving
keyword, the
inspiration for @scalaz.deriving
. Defining the derivation rules is an advanced
topic, but it is easy to derive a typeclass for an ADT:
Records of Functions
In Scala, typeclasses and algebras are both defined as a trait
interface.
Typeclasses are injected by the implicit
feature and algebras are passed as
explicit parameters. There is no language-level support in Haskell for algebras:
they are just data!
Consider Console
from the introduction. We can rewrite it into Haskell:
with business logic using a Monad
constraint
A production implementation of Console
would likely have type Console IO
.
The Scalaz liftIO
function is inspired by a Haskell function of the same name
and can lift Console IO
into any Advanced Monad stack.
Two additional language extensions make the business logic even cleaner. For
example, RecordWildCards
allows us to import all the fields of a data type by
using {..}
:
NamedFieldPuns
requires each imported field to be listed explicitly, which is
more boilerplate but makes the code easier to read:
Whereas in Scala this encoding may be called Finally Tagless, in Haskell it is known as MTL style with records of functions. Without going into details, some Scala developers didn’t understand a research paper about the performance benefits of Generalised ADTs in Haskell.
An alternative to MTL style are Extensible Effects, also known as Free Monad style.
Modules
Haskell source code is arranged into hierarchical modules with the restriction
that all contents of a module
must live in a single file. The top of a file
declares the module
name
A convention is to use directories on disk to organise the code, so this file
would go into Silly/Tree.hs
.
By default all symbols in the file are exported but we can choose to export
specific members, for example the Tree
type and data constructors, and a
fringe
function, omitting sapling
:
Interestingly, we can export symbols that are imported into the module, allowing library authors to package up their entire API into a single module, regardless of how it is implemented.
In a different file we can import all the exported members from Silly.Tree
which is roughly equivalent to Scala’s import silly.tree._
syntax. If we want
to restrict the symbols that we import we can provide an explicit list in
parentheses after the import
Here we only import the Tree
type constructor (not the data constructors) and
the fringe
function. If we want to import all the data constructors (and
pattern matchers) we can use Tree(..)
. If we only want to import the Branch
constructor we can list it explicitly:
If we have a name collision on a symbol we can use a qualified
import, with an
optional list of symbols to import
and now to call the fringe
function we have to type Silly.Tree.fringe
instead of just fringe
. We can change the name of the module when importing it
The fringe
function is now accessed by T.fringe
.
Alternatively, rather than select what we want to import, we can choose what not to import
By default the Prelude
module is implicitly imported but if we add an explicit
import from the Prelude
module, only our version is used. We can use this
technique to hide unsafe legacy functions
or use a custom prelude and disable the default prelude with the
NoImplicitPrelude
language extension.
Evaluation
Haskell compiles to native code, there is no virtual machine, but there is a garbage collector. A fundamental aspect of the runtime is that all parameters are lazily evaluated by default. Haskell treats all terms as a promise to provide a value when needed, called a thunk. Thunks get reduced only as much as necessary to proceed, no more.
A huge advantage of lazy evaluation is that it is much harder to trigger a stack overflow! A disadvantage is that there is an overhead compared to strict evaluation, which is why Haskell allows us to opt in to strict evaluation on a per parameter basis.
Haskell is also nuanced about what strict evaluation means: a term is said to be in weak head normal-form (WHNF) if the outermost code blocks cannot be reduced further, and normal form if the term is fully evaluated. Scala’s default evaluation strategy roughly corresponds to normal form.
For example, these terms are normal form:
whereas these are not in normal form (they can be reduced further):
The following terms are in WHNF because the outer code cannot be reduced further (even though the inner parts can be):
and the following are not in WHNF
The default evaluation strategy is to perform no reductions when passing a term
as a parameter. Language level support allows us to request WHNF for any term
with ($!)
We can use an exclamation mark !
on data
parameters
The StrictData
language extension enables strict parameters for all data in
the module.
Another extension, BangPatterns
, allows !
to be used on the arguments of
functions. The Strict
language extension makes all functions and data
parameters in the module strict by default.
Going to the extreme we can use ($!!)
and the NFData
typeclass for normal
form evaluation:
which is subject to the availability of an NFData
instance.
The cost of strictness is that Haskell behaves like any other strict language and may perform unnecessary work. Opting in to strictness must therefore be done with great care, and only for measured performance improvements. If in doubt, be lazy and stick with the defaults.
Next Steps
Haskell is a faster, safer and simpler language than Scala and has proven itself
in industry. Consider taking the data61 course on functional programming, and
ask questions in the #qfpl
chat room on freenode.net
.
Some additional learning materials are:
- Programming in Haskell to learn Haskell from first principles.
- Parallel and Concurrent Programming in Haskell and What I Wish I Knew When Learning Haskell for intermediate wisdom.
- Glasgow Haskell Compiler User Guide and HaskellWiki for the cold hard facts.
- Eta, i.e. Haskell for the JVM.
If you enjoy using Haskell and understand the value that it would bring to your business, then tell your managers! That way, the small percentage of managers who commission Haskell projects will be able to attract functional programming talent from the many teams who do not, and everybody will be happy.
Third Party Licenses
Some of the source code in this book has been copied from free / libre software projects. The license of those projects require that the following texts are distributed with the source that is presented in this book.