Version
2.5
Version
This is the fifth major draft of this document since 2009.
Pull requests are always accepted for changes and additional content. This is a living document. The only way this document will stay up to date is through the kindness of readers like you and community patches and pull requests on Github.
If you’d like a physical copy of the text you can either print it for yourself (see Printable PDF) or purchase one online:
Author
This text is authored by Stephen Diehl.
- Web: www.stephendiehl.com
- Twitter: https://twitter.com/smdiehl
- Github: https://github.com/sdiehl
Special thanks for Erik Aker for copyediting assitance.
License
Copyright © 2009-2020 Stephen Diehl
This code included in the text is dedicated to the public domain. You can copy, modify, distribute and perform the code, even for commercial purposes, all without asking permission.
You may distribute this text in its full form freely, but may not reauthor or sublicense this work. Any reproductions of major portions of the text must include attribution.
The software is provided “as is”, without warranty of any kind, express or implied, including But not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, Arising from, out of or in connection with the software or the use or other dealings in the software.
What is Haskell?
At its heart Haskell is a lazy, functional, statically-typed programming language with advanced type system features such as higher-rank, higher-kinded parametric polymorphism, monadic effects, generalized algebraic data types, ad-hoc polymorphism through type classes, associated type families, and more. As a programming language, Haskell pushes the frontiers of programming language design more so than any other general purpose language while still remaining practical for everyday use.
Beyond language features, Haskell remains an organic, community-driven effort, run by its userbase instead of by corporate influences. While there are some Haskell companies and consultancies, most are fairly small and none have an outsized influence on the development of the language. This is in stark contrast to ecosystems like Java and Go where Oracle and Google dominate all development. In fact, the Haskell community is a synthesis between multiple disciplines of academic computer science and industrial users from large and small firms, all of whom contribute back to the language ecosystem.
Originally, Haskell was borne out of academic research. Designed as an ML dialect, it was initially inspired by an older language called Miranda. In the early 90s, a group of academics formed the GHC committee to pursue building a research vehicle for lazy programming languages as a replacement for Miranda. This was a particularly in-vogue research topic at the time and as a result the committee attracted various talented individuals who initiated the language and ultimately laid the foundation for modern Haskell.
Over the last 30 years Haskell has evolved into a mature ecosystem, with an equally mature compiler. Even so, the language is frequently reimagined by passionate contributors who may be furthering academic research goals or merely contributing out of personal interest. Although laziness was originally the major research goal, this has largely become a quirky artifact that most users of the language are generally uninterested in. In modern times the major themes of Haskell community are:
- A vehicle for type system research
- Experimentation in the design space of typed effect systems
- Algebraic structures as a method of program synthesis
- Referential transparency as a core language feature
- Embedded domain specific languages
- Experimentation toward practical dependent types
- Stronger encoding of invariants through type-level programming
- Efficient functional compiler design
- Alternative models of parallel and concurrent programming
Although these are the major research goals, Haskell is still a fully general purpose language, and it has been applied in wildly diverse settings from garbage trucks to cryptanalysis for the defense sector and everything in-between. With a thriving ecosystem of industrial applications in web development, compiler design, machine learning, financial services, FPGA development, algorithmic trading, numerical computing, cryptography research, and cybersecurity, the language has a lot to offer to any field or software practitioner.
Haskell as an ecosystem is one that is purely organic, it takes decades to evolve, makes mistakes and is not driven by any one ideology or belief about the purpose of functional programming. This makes Haskell programming simultaneously frustrating and exciting; and therein lies the fun that has been the intellectual siren song that has drawn many talented programmers to dabble in this beautiful language at some point in their lives.
See:
How to Read
This is a guide for working software engineers who have an interest in Haskell but don’t know Haskell yet. I presume you know some basics about how your operating system works, the shell, and some fundamentals of other imperative programming languages. If you are a Python or Java software engineer with no Haskell experience, this is the executive summary of Haskell theory and practice for you. We’ll delve into a little theory as needed to explain concepts but no more than necessary. If you’re looking for a purely introductory tutorial, this probably isn’t the right start for you, however this can be read as a companion to other introductory texts.
There is no particular order to this guide, other than the first chapter which describes how to get set up with Haskell and use the foundational compiler and editor tooling. After that you are free to browse the chapters in any order. Most are divided into several sections which outline different concepts, language features or libraries. However, the general arc of this guide bends toward more complex topics in later chapters.
As there is no ordering after the first chapter I will refer to concepts globally without introducing them first. If something doesn’t make sense just skip it and move on. I strongly encourage you to play around with the source code modules for yourself. Haskell cannot be learned from an armchair; instead it can only be mastered by writing a ton of code for yourself. GHC may initially seem like a cruel instructor, but in time most people grow to see it as their friend.
GHC
GHC is the Glorious Glasgow Haskell Compiler. Originally written in 1989, GHC is now the de facto standard for Haskell compilers. A few other compilers have existed along the way, but they either are quite limited or have bit rotted over the years. At this point, GHC is a massive compiler and it supports a wide variety of extensions. It’s also the only reference implementation for the Haskell language and as such, it defines what Haskell the language is by its implementation.
GHC is run at the command line with the command ghc
.
GHC’s runtime is written in C and uses machinery from GCC infrastructure for its native code generator and can also use LLVM for its native code generation. GHC is supported on the following architectures:
- Linux x86
- Linux x86_64
- Linux PowerPC
- NetBSD x86
- OpenBSD x86
- FreeBSD x86
- MacOS X Intel
- MacOS X PowerPC
- Windows x86_64
GHC itself depends on the following Linux packages.
- build-essential
- libgmp-dev
- libffi-dev
- libncurses-dev
- libtinfo5
ghcup
There are two major packages that need to be installed to use Haskell:
- ghc
- cabal-install
GHC can be installed on Linux and Mac with ghcup by running the following command:
This can be used to manage multiple versions of GHC installed locally.
To select which version of GHC is available on the PATH use the set
command.
This can also be used to install cabal.
To modify your shell to include ghc and cabal.
Or you can permanently add the following to your .bashrc
or .zshrc
file:
Package Managers
There are two major Haskell packaging tools: Cabal and Stack. Both take differing views on versioning schemes but can more or less interoperate at the package level. So, why are there two different package managers?
The simplest explanation is that Haskell is an organic ecosystem with no central authority, and as such different groups of people with different ideas and different economic interests about optimal packaging built their own solutions around two different models. The interests of an organic community don’t always result in open source convergence; however, the ecosystem has seen both package managers reach much greater levels of stability as a result of collaboration. In this article, I won’t offer a preference for which system to use: it is left up to the reader to experiment and use the system which best suits your or your company’s needs.
Project Structure
A typical Haskell project hosted on Github or Gitlab will have several executable, test and library components across several subdirectories. Each of these files will correspond to an entry in the Cabal file.
More complex projects consisting of multiple modules will include multiple project directories like those above, but these will be nested in subfolders with a cabal.project
or stack.yaml
in the root of the repository.
An example Cabal project file, named cabal.project
above, this multi-component library repository would include these lines.
By contrast, an example Stack project stack.yaml
for the above multi-component library repository would be:
Cabal
Cabal is the build system for Haskell. Cabal is also the standard build tool for Haskell source supported by GHC. Cabal can be used simultaneously with Stack or standalone with cabal new-build.
To update the package index from Hackage, run:
To start a new Haskell project, run:
This will result in a .cabal
file being created with the configuration options for our new project.
Cabal can also build dependencies in parallel by passing -j
where n
is the number of concurrent builds.
Let’s look at an example .cabal
file. There are two main entry points that any package may provide: a library
and an executable
. Multiple executables can be defined, but only one library. In addition, there is a special form of executable entry point Test-Suite
, which defines an interface for invoking unit tests from cabal
.
For a library, the exposed-modules
field in the .cabal
file indicates which modules within the package structure will be publicly visible when the package is installed. These modules are the user-facing APIs that we wish to expose to downstream consumers.
For an executable, the main-is
field indicates the module that exports the main
function responsible for running the executable logic of the application. Every module in the package must be listed in one of other-modules
, exposed-modules
or main-is
fields.
To run an “executable” under cabal
execute the command:
To load the “library” into a GHCi shell under cabal
execute the command:
The
metavariable is either one of the executable or library declarations in the .cabal
file and can optionally be disambiguated by the prefix exe:
or lib:
respectively.
To build the package locally into the ./dist/build
folder, execute the build
command:
To run the tests, our package must itself be reconfigured with the --enable-tests
flag and the build-depends
options. The Test-Suite
must be installed manually, if not already present.
Moreover, arbitrary shell commands can be invoked with the GHC environmental variables. It is quite common is to run a new bash shell with this command such that the ghc
and ghci
commands use the package environment. This can also run any system executable with the GHC_PACKAGE_PATH
variable set to the libraries package database.
The haddock documentation can be generated for the local project by executing the haddock
command. The documentation will be built to the ./dist
folder.
When we’re finally ready to upload to Hackage ( presuming we have a Hackage account set up ), then we can build the tarball and upload with the following commands:
The current state of a local build can be frozen with all current package constraints enumerated:
This will create a file cabal.config
with the constraint set.
The cabal
configuration is stored in $HOME/.cabal/config
and contains various options including credential information for Hackage upload.
A library can also be compiled with runtime profiling information enabled. More on this is discussed in the section on Concurrency and Profiling.
Another common flag to enable is documentation
which forces the local build of Haddock documentation, which can be useful for offline reference. On a Linux filesystem these are built to the /usr/share/doc/ghc-doc/html/libraries/
directory.
Cabal can also be used to install packages globally to the system PATH. For example the parsec package to your system from Hackage, the upstream source of Haskell packages, invoke the install
command:
To download the source for a package, we can use the get
command to retrieve the source from Hackage.
Cabal New-Build
The interface for Cabal has seen an overhaul in the last few years and has moved more closely towards the Nix-style of local builds. Under the new system packages are separated into categories:
- Local Packages – Packages are built from a configuration file which specifies a path to a directory with a cabal file. These can be working projects as well as all of its local transitive dependencies.
- External Packages – External packages are packages retrieved from either the public Hackage or a private Hackage repository. These packages are hashed and stored locally in
~/.cabal/store
to be reused across builds.
As of Cabal 3.0 the new-build commands are the default operations for build operations. So if you type cabal build
using Cabal 3.0 you are already using the new-build system.
Historically these commands were separated into two different command namespaces with prefixes v1-
and v2-
, with v1 indicating the old sandbox build system and the v2 indicating the new-build system.
The new build commands are listed below:
Cabal also stores all of its build artifacts inside of a dist-newstyle
folder stored in the project working directory. The compilation artifacts are of several categories.
.hi
– Haskell interface modules which describe the type information, public exports, symbol table, and other module guts of compiled Haskell modules..hie
– An extended interface file containing module symbol data..hspp
– A Haskell preprocessor file..o
– Compiled object files for each module. These are emitted by the native code generator assembler..s
– Assembly language source file..bc
– Compiled LLVM bytecode file..ll
– An LLVM source file.cabal_macros.h
– Contains all of the preprocessor definitions that are accessible when using the CPP extension.cache
– Contains all artifacts generated by solving the constraints of packages to set up a build plan. This also contains the hash repository of all external packages.packagedb
– Database of all of the cabal metadata of all external and local packages needed to build the project. See Package Databases.
These all get stored under the dist-newstyle
folder structure which is set up hierarchically under the specific CPU architecture, GHC compiler version and finally the package version.
Local Packages
Both Stack and Cabal can handle local packages built from the local filesystem, from remote tarballs, or from remote Git repositories.
Inside of the stack.yaml
simply specify the git repository remote and the hash to pull.
In Cabal to add a remote create a cabal.project
file and add your remote in the source-repository-package
section.
Version Bounds
All Haskell packages are versioned and the numerical quantities in the version are supposed to follow the Package Versioning Policy.
As packages evolve over time there are three numbers which monotonically increase depending on what has changed in the package.
- Major version number
- Minor version number
- Patch version number
Every library’s cabal file will have a packages dependencies section which will specify the external packages which the library depends on. It will also contain the allowed versions that it is known to build against in the build-depends
section. The convention is to put the upper bound to the next major unreleased version and the lower bound at the currently used version.
Individual lines in the version specification can be dependent on other variables in the cabal file.
Version bounds in cabal files can be managed automatically with a tool cabal-bounds
which can automatically generate, update and format cabal files.
See:
Stack
Stack is an alternative approach to Haskell’s package structure that emerged in 2015. Instead of using a rolling build like Cabal, Stack breaks up sets of packages into release blocks that guarantee internal compatibility between sets of packages. The package solver for Stack uses a different strategy for resolving dependencies than cabal-install has historically used and Stack combines this with a centralised build server called Stackage which continuously tests the set of packages in a resolver to ensure they build against each other.
Install
To install stack
on Linux or Mac, run:
For other operating systems, see the official install directions.
Usage
Once stack
is installed, it is possible to setup a build environment on top of your existing project’s cabal
file by running:
An example stack.yaml
file for GHC 8.8.1 would look like this:
Most of the common libraries used in everyday development are already in the Stackage repository. The extra-deps
field can be used to add Hackage dependencies that are not in the Stackage repository. They are specified by the package and the version key. For instance, the zenc
package could be added to stack build
in the following way:
The stack
command can be used to install packages and executables into either the current build environment or the global environment. For example, the following command installs the executable for hlint
, a popular linting tool for Haskell, and places it in the PATH:
To check the set of dependencies, run:
Just as with cabal
, the build and debug process can be orchestrated using stack
commands:
To visualize the dependency graph, use the dot command piped first into graphviz, then piped again into your favorite image viewer:
Hpack
Hpack is an alternative package description language that uses a structured YAML format to generate Cabal files. Hpack succeeds in DRYing (Don’t Repeat Yourself) several sections of cabal files that are often quite repetitive across large projects. Hpack uses a package.yaml
file which is consumed by the command line tool hpack
. Hpack can be integrated into Stack and will generate resulting cabal files whenever stack build
is invoked on a project using a package.yaml
file. The output cabal file contains a hash of the input yaml file for consistency checking.
A small package.yaml
file might look something like the following:
Base
GHC itself ships with a variety of core libraries that are loaded into all Haskell projects. The most foundational of these is base
which forms the foundation for all Haskell code. The base library is split across several modules.
- Prelude – The default namespace imported in every module.
- Data – The simple data structures wired into the language
- Control – Control flow functions
- Foreign – Foreign function interface
- Numeric – Numerical tower and arithmetic operations
- System – System operations for Linux/Mac/Windows
- Text – Basic String types.
- Type – Typelevel operations
- GHC – GHC Internals
- Debug – Debug functions
- Unsafe – Unsafe “backdoor” operations
There have been several large changes to Base over the years which have resulted in breaking changes that means older versions of base are not compatible with newer versions.
- Monad Applicative Proposal (AMP)
- MonadFail Proposal (MFP)
- Semigroup Monoid Proposal (SMP)
Prelude
The Prelude is the default standard module. The Prelude is imported by default into all Haskell modules unless either there is an explicit import statement for it, or the NoImplicitPrelude extension is enabled.
The Prelude exports several hundred symbols that are the default datatypes and functions for libraries that use the GHC-issued prelude. Although the Prelude is the default import, many libraries these days do not use the standard prelude instead choosing to roll a custom one on a per-project basis or to use an off-the shelf prelude from Hackage.
The Prelude contains common datatype and classes such as List, Monad, Maybe and most associated functions for manipulating these structures. These are the most foundational programming constructs in Haskell.
Modern Haskell
There are two official language standards:
- Haskell98
- Haskell2010
And then there is what is colloquially referred to as Modern Haskell which is not an official language standard, but an ambiguous term to denote the emerging way most Haskellers program with new versions of GHC. The language features typically included in modern Haskell are not well-defined and will vary between programmers. For instance, some programmers prefer to stay quite close to the Haskell2010 standard and only include a few extensions while some go all out and attempt to do full dependent types in Haskell.
By contrast, the type of programming described by the phrase Modern Haskell typically utilizes some type-level programming, as well as flexible typeclasses, and a handful of Language Extensions.
Flags
GHC has a wide variety of flags that can be passed to configure different behavior in the compiler. Enabling GHC compiler flags grants the user more control in detecting common code errors. The most frequently used flags are:
-fwarn-tabs |
Emit warnings of tabs instead of spaces in the source code |
-fwarn-unused-imports |
Warn about libraries imported without being used |
-fwarn-name-shadowing |
Warn on duplicate names in nested bindings |
-fwarn-incomplete-uni-patterns |
Emit warnings for incomplete patterns in lambdas or pattern bindings |
-fwarn-incomplete-patterns |
Warn on non-exhaustive patterns |
-fwarn-overlapping-patterns |
Warn on pattern matching branches that overlap |
-fwarn-incomplete-record-updates |
Warn when records are not instantiated with all fields |
-fdefer-type-errors |
Turn type errors into warnings |
-fwarn-missing-signatures |
Warn about toplevel missing type signatures |
-fwarn-monomorphism-restriction |
Warn when the monomorphism restriction is applied implicitly |
-fwarn-orphans |
Warn on orphan typeclass instances |
-fforce-recomp |
Force recompilation regardless of timestamp |
-fno-code |
Omit code generation, just parse and typecheck |
-fobject-code |
Generate object code |
Like most compilers, GHC takes the -Wall
flag to enable all warnings. However, a few of the enabled warnings are highly verbose. For example, -fwarn-unused-do-bind
and -fwarn-unused-matches
typically would not correspond to errors or failures.
Any of these flags can be added to the ghc-options
section of a project’s .cabal
file. For example:
The flags described above are simply the most useful. See the official reference for the complete set of GHC’s supported flags.
For information on debugging GHC internals, see the commentary on GHC internals.
Hackage
Hackage is the upstream source of open source Haskell packages. With Haskell’s continuing evolution, Hackage has become many things to developers, but there seem to be two dominant philosophies of uploaded libraries.
A Repository for Production Libraries
In the first philosophy, libraries exist as reliable, community-supported building blocks for constructing higher level functionality on top of a common, stable edifice. In development communities where this method is the dominant philosophy, the authors of libraries have written them as a means of packaging up their understanding of a problem domain so that others can build on their understanding and expertise.
An Experimental Playground
In contrast to the previous method of packaging, a common philosophy in the Haskell community is that Hackage is a place to upload experimental libraries as a means of getting community feedback and making the code publicly available. Library authors often rationalize putting these kinds of libraries up without documentation, often without indication of what the library actually does or how it works. This unfortunately means a lot of Hackage namespace has become polluted with dead-end, bit-rotting code. Sometimes packages are also uploaded purely for internal use within an organisation, or to accompany an academic paper. These packages are often left undocumented as well.
For developers coming to Haskell from other language ecosystems that favor the former philosophy (e.g., Python, JavaScript, Ruby), seeing thousands of libraries without the slightest hint of documentation or description of purpose can be unnerving. It is an open question whether the current cultural state of Hackage is sustainable in light of these philosophical differences.
Needless to say, there is a lot of very low-quality Haskell code and documentation out there today, so being conservative in library assessment is a necessary skill. That said, there are also quite a few phenomenal libraries on Hackage that are highly curated by many people.
As a general rule, if the Haddock documentation for the library does not have a minimal working example, it is usually safe to assume that it is an RFC-style library and probably should be avoided for production code.
There are several heuristics you can use to answer the question Should I Use this Hackage Library:
- Check the Uploaded to see if the author has updated it in the last five years.
- Check the Maintainer email address, if the author has an academic email address and has not uploaded a package in two or more years, it is safe to assume that this is a thesis project and probably should not be used industrially.
- Check the Modules to see if the author has included toplevel Haddock docstrings. If the author has not included any documentation then the library is likely of low-quality and should not be used industrially.
- Check the Dependencies for the bound on
base
package. If it doesn’t include the latest base included with the latest version of GHC then the code is likely not actively maintained. - Check the reverse Hackage search to see if the package is used by other libraries in the ecosystem. For example: https://packdeps.haskellers.com/reverse/QuickCheck
An example of a bitrotted package:
https://hackage.haskell.org/package/numeric-quest
An example of a well maintained package:
https://hackage.haskell.org/package/QuickCheck
Stackage
Stackage is an alternative opt-in packaging repository which mirrors a subset of Hackage. Packages that are included in Stackage are built in a massive continuous integration process that checks to see that given versions link successfully against each other. This can give a higher degree of assurance that the bounds of a given resolver ensure compatibility.
Stackage releases are built nightly and there are also long-term stable (LTS) releases. Nightly resolvers have a date convention while LTS releases have a major and minor version. For example:
lts-14.22
nightly-2020-01-30
See:
GHCi
GHCi is the interactive shell for the GHC compiler. GHCi is where we will spend most of our time in everyday development. Following is a table of useful GHCi commands.
:reload |
:r |
Code reload |
:type |
:t |
Type inspection |
:kind |
:k |
Kind inspection |
:info |
:i |
Information |
:print |
:p |
Print the expression |
:edit |
:e |
Load file in system editor |
:load |
:l |
Set the active Main module in the REPL |
:module |
:m |
Add modules to imports |
:add |
:ad |
Load a file into the REPL namespace |
:instances |
:in |
Show instances of a typeclass |
:browse |
:bro |
Browse all available symbols in the REPL namespace |
The introspection commands are an essential part of debugging and interacting with Haskell code:
Querying the current state of the global environment in the shell is also possible. For example, to view module-level bindings and types in GHCi, run:
To examine module-level imports, execute:
Language extensions can be set at the repl.
To see compiler-level flags and pragmas, use:
Language extensions and compiler pragmas can be set at the prompt. See the Flag Reference for the vast collection of compiler flag options.
Several commands for the interactive shell have shortcuts:
+t |
Show types of evaluated expressions |
+s |
Show timing and memory usage |
+m |
Enable multi-line expression delimited by :{ and :} . |
.ghci.conf
The GHCi shell can be customized globally by defining a configure file ghci.conf
in $HOME/.ghc/
or in the current working directory as ./.ghci.conf
.
For example, we can add a command to use the Hoogle type search from within GHCi. First, install hoogle
:
Then, we can enable the search functionality by adding a command to our ghci.conf
:
It is common community tradition to set the prompt to a colored λ
:
GHC can also be coerced into giving slightly better error messages:
GHCi can also use a pretty printing library to format all output, which is often much easier to read. For example if your project is already using the amazing pretty-simple
library simply include the following line in your ghci configuration.
And the default prelude can also be disabled and swapped for something more sensible:
GHCi Performance
For large projects, GHCi with the default flags can use quite a bit of memory and take a long time to compile. To speed compilation by keeping artifacts for compiled modules around, we can enable object code compilation instead of bytecode.
Enabling object code compilation may complicate type inference, since type information provided to the shell can sometimes be less informative than source-loaded code. This underspecificity can result in breakage with some language extensions. In that case, you can temporarily reenable bytecode compilation on a per module basis with the -fbyte-code
flag.
If you all you need is to typecheck your code in the interactive shell, then disabling code generation entirely makes reloading code almost instantaneous:
Editor Integration
Haskell has a variety of editor tools that can be used to provide interactive development feedback and functionality such as querying types of subexpressions, linting, type checking, and code completion. These are largely provided by the haskell-ide-engine which serves as an editor agnostic backend that interfaces with GHC and Cabal to query code.
Vim
Emacs
VSCode
Linux Packages
There are several upstream packages for Linux packages which are released by GHC development. The key ones of note for Linux are:
For scripts and operations tools, it is common to include commands to add the following apt repositories, and then use these to install the signed GHC and cabal-install binaries (if using Cabal as the primary build system).
It is not advisable to use a Linux system package manager to manage Haskell dependencies. Although this can be done, in practice it is better to use Cabal or Stack to create locally isolated builds to avoid incompatibilities.
Names
Names in Haskell exist within a specific namespace. Names are either unqualified of the form:
Or qualified by the module where they come from, such as:
The major namespaces are described below with their naming conventions
Modules | Uppercase |
Functions | Lowercase |
Variables | Lowercase |
Type Variables | Lowercase |
Datatypes | Uppercase |
Constructors | Uppercase |
Typeclasses | Uppercase |
Synonyms | Uppercase |
Type Families | Uppercase |
Modules
A module consists of a set of imports and exports and when compiled generates an interface which is linked against other Haskell modules. A module may reexport symbols from other modules.
Modules’ dependency graphs optionally may be cyclic (i.e. they import symbols from each other) through the use of a boot file, but this is often best avoided if at all possible.
Various module import strategies exist. For instance, we may:
Import all symbols into the local namespace.
Import select symbols into the local namespace:
Import into the global namespace masking a symbol:
Import symbols qualified under Data.Map
namespace into the local namespace.
Import symbols qualified and reassigned to a custom namespace (M
, in the example below):
You may also dump multiple modules into the same namespace so long as the symbols do not clash:
A main module is a special module which reserves the name Main
and has a mandatory export of type IO ()
which is invoked when the executable is run.. This is the entry point from the system into a Haskell program.
Functions
Functions are the central construction in Haskell. A function f
of two arguments x
and y
can be defined in a single line as the left-hand and right-hand side of an equation:
This line defines a function named f
of two arguments, which on the right-hand side adds and yields the result. Central to the idea of functional programming is that computational functions should behave like mathematical functions. For instance, consider this mathematical definition of the above Haskell function, which, aside from the parentheses, looks the same:
f(x, y) = x + y
In Haskell, a function of two arguments need not necessarily be applied to two arguments. The result of applying only the first argument is to yield another function to which later the second argument can be applied. For example, we can define an add
function and subsequently a single-argument inc
function, by merely pre-applying 1
to add
:
In addition to named functions Haskell also has anonymous lambda functions denoted with a backslash. For example the identity function:
Is identical to:
Functions may call themselves or other functions as arguments; a feature known as higher-order functions. For example the following function applies a given argument f
, which is itself a function, to a value x
twice.
Types
Typed functional programming is essential to the modern Haskell paradigm. But what are types precisely?
The syntax of a programming language is described by the constructs that define its types, and its semantics are described by the interactions among those constructs. A type system overlays additional structure on top of the syntax that imposes constraints on the formation of expressions based on the context in which they occur.
Dynamic programming languages associate types with values at evaluation, whereas statically typed languages associate types to expressions before evaluation. Dynamic languages are in a sense as statically typed as static languages, however they have a degenerate type system with only one type.
The dominant philosophy in functional programming is to “make invalid states unrepresentable” at compile-time, rather than performing massive amounts of runtime checks. To this end Haskell has developed a rich type system that is based on typed lambda calculus known as Girard’s System-F (See Rank-N Types) and has incrementally added extensions to support more type-level programming over the years.
The following ground types are quite common:
()
– The unit typeChar
– A single unicode character (“code point”)Text
– Unicode stringsBool
– Boolean valuesInt
– Machine integersInteger
– GMP arbitrary precision integersFloat
– Machine floating point valuesDouble
– Machine double floating point values
Parameterised types consist of a type and several type parameters indicated as lower case type variables. These are associated with common data structures such as lists and tuples.
[a]
– Homogeneous lists with elements of typea
(a,b)
– Tuple with two elements of typesa
andb
(a,b,c)
– Tuple with three elements of typesa
,b
, andc
The type system grows quite a bit from here, but these are the foundational types you’ll first encounter. See the later chapters for all types off advanced features that can be optionally turned on.
This tutorial will only cover a small amount of the theory of type systems. For a more thorough treatment of the subject there are two canonical texts:
- Pierce, B. C., & Benjamin, C. (2002). Types and Programming Languages. MIT Press.
- Harper, R. (2016). Practical Foundations for Programming Languages. Cambridge University Press.
Type Signatures
A toplevel Haskell function consists of two lines. The value-level definition which is a function name, followed by its arguments on the left-hand side of the equals sign, and then the function body which computes the value it yields on the right-hand side:
The type-level definition is the function name followed by the type of its arguments separated by arrows, and the final term is the type of the entire function body, meaning the type of value yielded by the function itself.
Here is a simple example of a function which adds two integers.
Functions are also capable of invoking other functions inside of their function bodies:
The simplest function, called the identity function, is a function which takes a single value and simply returns it back. This is an example of a polymorphic function since it can handle values of any type. The identity function works just as well over strings as over integers.
This can alternatively be written in terms of an anonymous lambda function which is a backslash followed by a space-separated list of arguments, followed by a function body.
One of the big ideas in functional programming is that functions are themselves first class values which can be passed to other functions as arguments themselves. For example the applyTwice
function takes an argument f
which is of type (a -> a
) and it applies that function over a given value x
twice and yields the result. applyTwice
is a higher-order function which will transform one function into another function.
Often to the left of a type signature you will see a big arrow =>
which denotes a set of constraints over the type signature. Each of these constraints will be in uppercase and will normally mention at least one of the type variables on the right hand side of the arrow. These constraints can mean many things but in the simplest form they denote that a type variable must have an implementation of a type class. The add
function below operates over any two similar values x
and y
, but these values must have a numerical interface for adding them together.
Type signatures can also appear at the value level in the form of explicit type signatures which are denoted in parentheses.
These are sometimes needed to provide additional hints to the typechecker when specific terms are ambiguous to the typechecker, or when additional language extensions have been enabled which don’t have precise inference methods for deducing all type variables.
Currying
In other languages functions normally have an arity which prescribes the number of arguments a function can take. Some languages have fixed arity (like Fortran) others have flexible arity (like Python) where a variable of number of arguments can be passed. Haskell follows a very simple rule: all functions in Haskell take a single argument. For multi-argument functions (some of which we’ve already seen), arguments will be individually applied until the function is saturated and the function body is evaluated.
For example, the add function from above can be partially applied to produce an add1 function:
Uncurrying is the process of taking a function which takes two arguments and transforming it into a function which takes a tuple of arguments. The Haskell prelude includes both a curry and an uncurry function for transforming functions into those that take multiple arguments from those that take a tuple of arguments and vice versa:
For example, uncurry applied to the add function creates a function that takes a tuple of integers:
Algebraic Datatypes
Custom datatypes in Haskell are defined with the data
keyword followed by the the type name, its parameters, and then a set of constructors. The possible constructors are either sum types or of product types. All datatypes in Haskell can expressed as sums of products. A sum type is a set of options that is delimited by a pipe.
A datatype can only ever be inhabited by only single value from a sum type and intuitively models a set of “options” a value may take. While a product type is a combination of a set of typed values, potentially named by record fields. For example the following are two definitions of a Point product type, the latter with two fields x
and y
.
As another example: A deck of common playing cards could be modeled by the following set of product and sum types:
A record type can use these custom datatypes to define all the parameters that define an individual playing card.
Some example values:
The problem with the definition of this datatype is that it admits several values which are malformed. For instance it is possible to instantiate a Card
with a suit Hearts
but with color Black
which is an invalid value. The convention for preventing these kind of values in Haskell is to limit the export of constructors in a module and only provide a limited set of functions which the module exports, which can enforce these constraints. These are smart constructors and an extremely common pattern in Haskell library design. For example we can export functions for building up specific suit cards that enforce the color invariant.
Datatypes may also be recursive, in the sense that they can contain themselves as fields. The most common example is a linked list which can be defined recursively as either an empty list or a value linked to a potentially nested version of itself.
An example value would look like:
Constructors for datatypes can also be defined as infix symbols. This is somewhat rare, but is sometimes used in more math heavy libraries. For example the constructor for our list type could be defined as the infix operator :+:
. When the value is printed using a Show instance, the operator will be printed in infix form.
Lists
Linked lists or cons lists are a fundamental data structure in functional programming. GHC has builtin syntactic sugar in the form of list syntax which allows us to write lists that expand into explicit invocations of the cons operator (:)
. The operator is right associative and an example is shown below:
This syntax also extends to the typelevel where lists are represented as brackets around the type of values they contain.
The cons operator itself has the type signature which takes a head element as its first argument and a tail argument as its second.
The Data.List
module from the standard Prelude defines a variety of utility functions for operations over linked lists. For example the length
function returns the integral length of the number of elements in the linked list.
While the take
function extracts a fixed number of elements from the list.
Both of these functions are pure and return a new list without modifying the underlying list passed as an argument.
Another function iterate
is an example of a function which returns an infinite list. It takes as its first argument a function and then repeatedly applies that function to produce a new element of the linked list.
Consuming these infinite lists can be used as a control flow construct to construct loops. For example instead of writing an explicit loop, as we would in other programming languages, we instead construct a function which generates list elements. For example producing a list which produces subsequent powers of two:
We can then use the take
function to evaluate this lazy stream to a desired depth.
An equivalent loop in an imperative language would look like the following.
Pattern Matching
To unpack an algebraic datatype and extract its fields we’ll use a built in language construction known as pattern matching. This is denoted by the case
syntax and scrutinizes a specific value. A case expression will then be followed by a sequence of matches which consist of a pattern on the left and an arbitrary expression on the right. The left patterns will all consist of constructors for the type of the scrutinized value and should enumerate all possible constructors. For product type patterns that are scrutinized a sequence of variables will bind the fields associated with its positional location in the constructor. The types of all expressions on the right hand side of the matches must be identical.
Pattern matches can be written in explicit case statements or in toplevel functional declarations. The latter simply expands the former in the desugaring phase of the compiler.
Following on the playing card example in the previous section, we could use a pattern to produce a function which scores the face value of a playing card.
And we can use a double pattern match to produce a function which determines which suit trumps another suit. For example we can introduce an order of suits of cards where the ranking of cards proceeds (Clubs, Diamonds, Hearts, Spaces). A _
underscore used inside a pattern indicates a wildcard pattern and matches against any constructor given. This should be the last pattern used a in match list.
And finally we can write a function which determines if another card beats another card in terms of the two pattern matching functions above. The following pattern match brings the values of the record into the scope of the function body assigning to names specified in the pattern syntax.
Functions may also invoke themselves. This is known as recursion. This is quite common in pattern matching definitions which recursively tear down or build up data structures. This kind of pattern is one of the defining modes of programming functionally.
The following two recursive pattern matches are desugared forms of each other:
Pattern matching on lists is also an extremely common pattern. It has special pattern syntax and the tail variable is typically pluralized. In the following x
denotes the head variable and xs
denotes the tail. For example the following function traverses a list of integers and adds (+1)
to each value.
Guards
Guard statements are expressions that evaluate to boolean values that can be used to restrict pattern matches. These occur in a pattern match statements at the toplevel with the pipe syntax on the left indicating the guard condition. The special otherwise
condition is just a renaming of the boolean value True
exported from Prelude.
Guards can also occur in pattern case expressions.
Operators and Sections
An operator is a function that can be applied using infix syntax or partially applied using a section. Operators can be defined to use any combination of the special ASCII symbols or any unicode symbol.
!
#
%
&
*
+
.
/
<
=
>
?
@
^
|
-
~
:
The following are reserved syntax and cannot be overloaded:
..
:
::
=
|
<-
->
@
~
=>
Operators are of one of three fixity classes.
- Infix - Place between expressions
- Prefix - Placed before expressions
- Postfix - Placed after expressions. See Postfix Operators.
Expressions involving infix operators are disambiguated by the operator’s fixity and precedence. Infix operators are either left or right associative. Associativity determines how operators of the same precedence are grouped in the absence of parentheses.
Precedence and associativity are denoted by fixity declarations for the operator using either infixr
infixl
and infix
. The standard operators defined in the Prelude have the following precedence table.
infixr 9 .
infixr 8 ^, ^^, **
infixl 7 *, /, `quot`, `rem`, `div`, `mod`
infixl 6 +, -
infixr 5 ++
infix 4 ==, /=, <, <=, >=, >
infixr 3 &&
infixr 2 ||
infixr 1 >>, >>=
infixr 0 $, `seq`
Sections are written as ( op e )
or ( e op )
. For example:
Operators written within enclosed parens are applied like traditional functions. For example the following are equivalent:
Tuples
Tuples are heterogeneous structures which contain a fixed number of values. Some simple examples are shown below:
For two-tuples there are two functions fst
and snd
which extract the left and right values respectively.
GHC supports tuples to size 62.
Where & Let Clauses
Haskell syntax contains two different types of declaration syntax: let
and where
. A let binding is an expression and binds anywhere in its body. For example the following let binding declares x
and y
in the expression x+y
.
A where binding is a toplevel syntax construct (i.e. not an expression) that binds variables at the end of a function. For example the following binds x
and y
in the function body of f
which is x+y
.
Where clauses following the Haskell layout rule where definitions can be listed on newlines so long as the definitions have greater indentation than the first toplevel definition they are bound to.
Conditionals
Haskell has builtin syntax for scrutinizing boolean expressions. These are first class expressions known as if
statements. An if statement is of the form if cond then trueCond else falseCond
. Both the True
and False
statements must be present.
If statements are just syntactic sugar for case
expressions over boolean values. The following example is equivalent to the above example.
Function Composition
Functions are obviously at the heart of functional programming. In mathematics function composition is an operation which takes two functions and produces another function with the result of the first argument function applied to the result of the second function. This is written in mathematical notation as:
g ∘ f
The two functions operate over a domain. For example X, Y and Z.
f : X → Y g : Y → Z
Or in Haskell notation:
Composition operation results in a new function:
g ∘ f : X → Z
In Haskell this operator is given special infix operator to appear similar to the mathematical notation. Intuitively it takes two functions of types b -> c
and a -> b
and composes them together to produce a new function. This is the canonical example of a higher-order function.
Haskell code will liberally use this operator to compose chains of functions. For example the following composes a chain of list processing functions sort
, filter
and map
:
Another common higher-order function is the flip
function which takes as its first argument a function of two arguments, and reverses the order of these two arguments returning a new function.
The most common operator in all of Haskell is function application operator $
. This function is right associative and takes the entire expression on the right hand side of the operator and applies it to function on the left.
This is quite often used in the pattern where the left hand side is a composition of other functions applied to a single argument. This is common in point-free style of programming which attempts to minimize the number of input arguments in favour of pure higher order function composition. The flipped form of this function does the opposite and is left associative, and applies the entire left hand side expression to a function given in the second argument to the function.
For comparison consider the use of $
, &
and explicit parentheses.
The on
function takes a function b
and yields the result of applying unary function u
to two arguments x
and y
. This is a higher order function that transforms two inputs and combines the outputs.
This is used quite often in sort functions. For example we can write a custom sort function which sorts a list of lists based on length.
λ: import Data.List
λ: sortSize = sortBy (compare `on` length)
λ: sortSize [[1,2], [1,2,3], [1]]
[[1],[1,2],[1,2,3]]
List Comprehensions
List comprehensions are a syntactic construct that first originated in the Haskell language and has now spread to other programming languages. List comprehensions provide a simple way of working with lists and sequences of values that follow patterns. List comprehension syntax consists of three components:
- Generators - Expressions which evaluate a list of values which are iteratively added to the result.
- Let bindings - Expressions which generate a constant value which is scoped on each iteration.
- Guards - Expressions which generate a boolean expression which determine whether an iteration is added to the result.
The simplest generator is simply a list itself. The following example produces a list of integral values, each element multiplied by two.
We can extend this by adding a let statement which generalizes the multiplier on each step and binds it to a variable n
.
And we can also restrict the set of resulting values to only the subset of values of x
that meet a condition. In this case we restrict to only values of x
which are odd.
Comprehensions with multiple generators will combine each generator pairwise to produce the cartesian product of all results.
λ: [(x,y) | x <- [1,2,3], y <- [10,20,30]]
[(1,10),(1,20),(1,30),(2,10),(2,20),(2,30),(3,10),(3,20),(3,30)]
λ: [(x,y,z) | x <- [1,2], y <- [10,20], z <- [100,200]]
[(1,10,100),(1,10,200),(1,20,100),(1,20,200),(2,10,100),(2,10,200),(2,20,100),(2,20,200)]
Haskell has builtin comprehension syntax which is syntactic sugar for specific methods of the Enum
typeclass.
[ e1.. ] |
enumFrom e1 |
[ e1,e2.. ] |
enumFromThen e1 e2 |
[ e1..e3 ] |
enumFromTo e1 e3 |
[ e1,e2..e3 ] |
enumFromThenTo e1 e2 e3 |
There is an Enum
instance for Integer
and Char
types and so we can write list comprehensions for both, which generate ranges of values.
λ: [1 .. 15]
[1,2,3,4,5,6,7,8,9,10,11,12,13,14,15]
λ: ['a' .. 'z']
"abcdefghijklmnopqrstuvwxyz"
λ: [1,3 .. 15]
[1,3,5,7,9,11,13,15]
λ: [0,50..500]
[0,50,100,150,200,250,300,350,400,450,500]
These comprehensions can be used inside of function definitions and reference locally bound variables. For example the factorial
function (written as n!) is defined as the product of all positive integers up to a given value.
As a more complex example consider a naive prime number sieve:
And a more complex example, consider the classic FizzBuzz interview question. This makes use of iteration and guard statements.
Single line comments begin with double dashes --
:
Multiline comments begin with {-
and end with -}
.
Comments may also add additional structure in the form of Haddock docstrings. These comments will begin with a pipe.
Modules may also have a comment convention which describes the individual authors, copyright and stability information in the following form:
Typeclasses
Typeclasses are one of the core abstractions in Haskell. Just as we wrote polymorphic functions above which operate over all given types (the id
function is one example), we can use typeclasses to provide a form of bounded polymorphism which constrains type variables to a subset of those types that implement a given class.
For example we can define an equality class which allows us to define an overloaded notion of equality depending on the data structure provided.
Then we can define this typeclass over several different types. These definitions are called typeclass instances. For example for the Bool
type the equality typeclass would be defined as:
Over the unit type, where only a single value exists, the instance is trivial:
For the Ordering type, defined as:
We would have the following Equal instance:
An Equal instance for a more complex data structure like the list type relies upon the fact that the type of the elements in the list must also have a notion of equality, so we include this as a constraint in the typeclass context, which is written to the left of the fat arrow =>
. With this constraint in place, we can write this instance recursively by pattern matching on the list elements and checking for equality all the way down the spine of the list:
In the above definition, we know that we can check for equality between individual list elements if those list elements satisfy the Equal constraint. Knowing that they do, we can then check for equality between two complete lists.
For tuples, we will also include the Equal constraint for their elements, and we can then check each element for equality respectively. Note that this instance includes two constraints in the context of the typeclass, requiring that both type variables a
and b
must also have an Equal instance.
The default prelude comes with a variety of typeclasses that are used frequently and defined over many prelude types:
- Num - Provides a basic numerical interface for values with addition, multiplication, subtraction, and negation.
- Eq - Provides an interface for values that can be tested for equality.
- Ord - Provides an interface for values that have a total ordering.
- Read - Provides an interface for values that can be read from a string.
- Show - Provides an interface for values that can be printed to a string.
- Enum - Provides an interface for values that are enumerable to integers.
- Semigroup - Provides an algebraic semigroup interface.
- Functor - Provides an algebraic functor interface. See Functors.
- Monad - Provides an algebraic monad interface. See Monads.
- Category - Provides an algebraic category interface. See Categories.
- Bounded - Provides an interface for enumerable values with bounds.
- Integral - Provides an interface for integral-like quantities.
- Real - Provides an interface for real-like quantities.
- Fractional - Provides an interface for rational-like quantities.
- Floating - Provides an interface for defining transcendental functions over real values.
- RealFrac - Provides an interface for rounding real values.
- RealFloat - Provides an interface for working with IEE754 operations.
To see the implementation for any of these typeclasses you can run the GHCi info command to see the methods and all instances in scope. For example:
Many of the default classes have instances that can be derived automatically. After the definition of a datatype you can add a deriving
clause which will generate the instances for this datatype automatically. This does not work universally but for many instances which have boilerplate definitions, GHC is quite clever and can save you from writing quite a bit of code by hand.
For example for a custom list type.
Side Effects
Contrary to a common misconception, side effects are an integral part of Haskell programming. Probably the most interesting thing about Haskell’s approach to side effects is that they are encoded in the type system. This is certainly a different approach to effectful programming, and the language has various models for modeling these effects within the type system. These models range from using Monads to building algebraic models of effects that draw clear lines between effectful code and pure code. The idea of reasoning about where effects can and cannot exist is one of the key ideas of Haskell, but this certainly does not mean trying to avoid side effects altogether!
Indeed, a Hello World program in Haskell is quite simple:
Other side effects can include reading from the terminal and prompting the user for input, such as in the complete program below:
Records
Records in Haskell are fundamentally broken for several reasons:
- The syntax is unconventional.
Most programming languages use dot or arrow syntax for field accessors like the following:
Haskell however uses function application syntax since record accessors are simply just functions. Instead or creating a privileged class of names and syntax for field accessors, Haskell instead choose to implement the simplest model and expands accessors to function during compilation.
- Incomplete pattern matches are implicitly generated for sums of products.
The functions generated for a
or b
in both of these cases are partial. See Exhaustiveness checking.
- Lack of Namespacing
Given two records defined in the same module (or imported) GHC is unable to (by default) disambiguate which field accessor to assign at a callsite that uses a
.
This can be routed around with the language extension DisambiguateRecordFields
but only to a certain extent. If we want to write maximally polymorphic functions which operate over arbitrary records which have a field a
, then the GHC typesystem is not able to express this without some much higher-level magic.
Pragmas
At the beginning of a module there is special syntax for pragmas which direct the compiler to compile the current module in a specific way. The most common is a language extension pragma denoted like the following:
These flags alter the semantics and syntax of the module in a variety of ways. See Language Extensions for more details on all of these options.
Additionally we can pass specific GHC flags which alter the compilation behavior, enabling or disabling specific bespoke features based on our needs. These include compiler warnings, optimisation flags and extension flags.
Warning flags allow you to inform users at compile-time with a custom error message. Additionally you can mark a module as deprecated with a specific replacement message.
Newtypes
Newtypes are a form of zero-cost abstraction that allows developers to specify compile-time names for types for which the developer wishes to expose a more restrictive interface. They’re zero-cost because these newtypes end up with the same underlying representation as the things they differentiate. This allows the compiler to distinguish between different types which are representationally identical but semantically different.
For instance velocity can be represented as a scalar quantity represented as a double but the user may not want to mix doubles with other vector quantities. Newtypes allow us to distinguish between scalars and vectors at compile time so that no accidental calculations can occur.
Most importantly these newtypes disappear during compilation and the velocity type will be represented as simply just a machine double with no overhead.
See also the section on Newtype Deriving for a further discussion of tricks involved with handling newtypes.
Bottoms
The bottom is a singular value that inhabits every type. When this value is evaluated, the semantics of Haskell no longer yield a meaningful value. In other words, further operations on the value cannot be defined in Haskell. A bottom value is usually written as the symbol ⊥, ( i.e. the compiler flipping you off ). Several ways exist to express bottoms in Haskell code.
For instance, undefined
is an easily called example of a bottom value. This function has type a
but lacks any type constraints in its type signature. Thus, undefined
is able to stand in for any type in a function body, allowing type checking to succeed, even if the function is incomplete or lacking a definition entirely. The undefined
function is extremely practical for debugging or to accommodate writing incomplete programs.
Another example of a bottom value comes from the evaluation of the error
function, which takes a String
and returns something that can be of any type. This property is quite similar to undefined
, which also can also stand in for any type.
Calling error
in a function causes the compiler to throw an exception, halt the program, and print the specified error message.
In the divByY
function below, passing the function 0
as the divisor results in this function returning such an exception.
A third type way to express a bottom is with an infinitely looping term:
Examples of actual Haskell code that use this looping syntax lives in the source code of the GHC.Prim module. These bottoms exist because the operations cannot be defined in native Haskell. Such operations are baked into the compiler at a very low level. However, this module exists so that Haddock can generate documentation for these primitive operations, while the looping syntax serves as a placeholder for the actual implementation of the primops.
Perhaps the most common introduction to bottoms is writing a partial function that does not have exhaustive pattern matching defined. For example, the following code has non-exhaustive pattern matching because the case
expression, lacks a definition of what to do with a B
:
The code snippet above is translated into the following GHC Core output where the compiler will insert an exception to account for the non-exhaustive patterns:
GHC can be made more vocal about incomplete patterns using the -fwarn-incomplete-patterns
and -fwarn-incomplete-uni-patterns
flags.
A similar situation can arise with records. Although constructing a record with missing fields is rarely useful, it is still possible.
When the developer omits a field’s definition, the compiler inserts an exception in the GHC Core representation:
Fortunately, GHC will warn us by default about missing record fields.
Bottoms are used extensively throughout the Prelude, although this fact may not be immediately apparent. The reasons for including bottoms are either practical or historical.
The canonical example is the head
function which has type [a] -> a
. This function could not be well-typed without the bottom.
Some further examples of bottoms:
It is rare to see these partial functions thrown around carelessly in production code because they cause the program to halt. The preferred method for handling exceptions is to combine the use of safe variants provided in Data.Maybe
with the functions maybe
and either
.
Another method is to use pattern matching, as shown in listToMaybe
, a safer version of head
described below:
Invoking a bottom defined in terms of error
typically will not generate any position information. However, assert
, which is used to provide assertions, can be short-circuited to generate position information in place of either undefined
or error
calls.
See: Avoiding Partial Functions
Exhaustiveness
Pattern matching in Haskell allows for the possibility of non-exhaustive patterns. For example, passing Nothing to unsafe
will cause the program to crash at runtime. However, this function is an otherwise valid, type-checked program.
Since unsafe
takes a Maybe a
value as its argument, two possible values are valid input: Nothing
and Just a
. Since the case of a Nothing
was not defined in unsafe
, we say that the pattern matching within that function is non-exhaustive. In other words, the function does not implement appropriate handling of all valid inputs. Instead of yielding a value, such a function will halt from an incomplete match.
Partial functions from non-exhaustivity are a controversial subject, and frequent use of non-exhaustive patterns is considered a dangerous code smell. However, the complete removal of non-exhaustive patterns from the language would itself be too restrictive and forbid too many valid programs.
Several flags exist that we can pass to the compiler to warn us about such patterns or forbid them entirely, either locally or globally.
The -Wall
or -fwarn-incomplete-patterns
flag can also be added on a per-module basis by using the OPTIONS_GHC
pragma.
A more subtle case of non-exhaustivity is the use of implicit pattern matching with a single uni-pattern in a lambda expression. In a manner similar to the unsafe
function above, a uni-pattern cannot handle all types of valid input. For instance, the function boom
will fail when given a Nothing, even though the type of the lambda expression’s argument is a Maybe a
.
Non-exhaustivity arising from uni-patterns in lambda expressions occurs frequently in let
or do
-blocks after desugaring, because such code is translated into lambda expressions similar to boom
.
GHC can warn about these cases of non-exhaustivity with the -fwarn-incomplete-uni-patterns
flag.
Generally speaking, any non-trivial program will use some measure of partial functions. It is simply a fact. Thus, there exist obligations for the programmer that cannot be manifested in the Haskell type system.
Debugger
Since GHC version 6.8.1, a built-in debugger has been available, although its use is somewhat rare. Debugging uncaught exceptions is in a similar style to debugging segfaults with gdb. Breakpoints can be set :break
and the call stack stepped through with :forward
and :back
.
Stack Traces
With runtime profiling enabled, GHC can also print a stack trace when a diverging bottom term (error, undefined) is hit. This action, though, requires a special flag and profiling to be enabled, both of which are disabled by default. So, for example:
And indeed, the runtime tells us that the exception occurred in the function g
and enumerates the call stack.
It is best to run this code without optimizations applied -O0
so as to preserve the original call stack as represented in the source. With optimizations applied, GHC will rearrange the program in rather drastic ways, resulting in what may be an entirely different call stack.
Printf Tracing
Since Haskell is a pure language it has the unique property that most code is introspectable on its own. As such, using printf to display the state of the program at critical times throughout execution is often unnecessary because we can simply open GHCi and test the function. Nevertheless, Haskell does come with an unsafe trace
function which can be used to perform arbitrary print statements outside of the IO monad. You can place these statements wherever you like in your code without without IO restrictions.
Trace uses unsafePerformIO
under the hood and should not be used in production code.
In addition to the trace
function, several monadic trace
variants are quite common.
Type Inference
While inference in Haskell is usually complete, there are cases where the principal type cannot be inferred. Three common cases are:
- Reduced polymorphism due to mutually recursive binding groups
- Undecidability due to polymorphic recursion
- Reduced polymorphism due to the monomorphism restriction
In each of these cases, Haskell needs a hint from the programmer, which may be provided by adding explicit type signatures.
Mutually Recursive Binding Groups
In this case, the inferred type signatures are correct in their usage, but they don’t represent the most general signatures. When GHC analyzes the module it analyzes the dependencies of expressions on each other, groups them together, and applies substitutions from unification across mutually defined groups. As such the inferred types may not be the most general types possible, and an explicit signature may be desired.
Polymorphic recursion
In the second case, recursion is polymorphic because the inferred type variable a
in size
spans two possible types (a
and (a,a)
). These two types won’t pass the occurs-check of the typechecker and it yields an incorrect inferred type:
Simply adding an explicit type signature corrects this. Type inference using polymorphic recursion is undecidable in the general case.
See: Static Semantics of Function and Pattern Bindings
Monomorphism Restriction
Finally Monomorphism restriction is a builtin typing rule. By default, it is turned on when compiling and off in GHCi. The practical effect of this rule is that types inferred for functions without explicit type signatures may be more specific than expected. This is because GHC will sometimes reduce a general type, such as Num
to a default type, such as Double
. This can be seen in the following example in GHCi:
This rule may be deactivated with the NoMonomorphicRestriction
extension, see below.
See:
Type Holes
Since the release of GHC 7.8, type holes allow underscores as stand-ins for actual values. They may be used either in declarations or in type signatures.
Type holes are useful in debugging incomplete programs. By placing an underscore on any value on the right hand-side of a declaration, GHC will throw an error during type-checking. The error message describes which values may legally fill the type hole.
GHC has rightly suggested that the expression needed to finish the program is xs :: [a]
.
The same hole technique can be applied at the toplevel for signatures:
Pattern wildcards can also be given explicit names so that GHC will use the names when reporting the inferred type in the resulting message.
The same wildcards can be used in type contexts to dump out inferred type class constraints:
When the flag -XPartialTypeSignatures
is passed to GHC and the inferred type is unambiguous, GHC will let us leave the holes in place and the compilation will proceed with a warning instead of an error.
Deferred Type Errors
Since the release of version 7.8, GHC supports the option of treating type errors as runtime errors. With this option enabled, programs will run, but they will fail when a mistyped expression is evaluated. This feature is enabled with the -fdefer-type-errors
flag in three ways: at the module level, when compiled from the command line, or inside of a GHCi interactive session.
For instance, the program below will compile:
However, when a pathological term is evaluated at runtime, we’ll see a message like this:
This error tells us that while x
has a declared type of ()
, the body of the function print 3
has a type of IO ()
. However, if the term is never evaluated, GHC will not throw an exception.
Name Conventions
Haskell uses short variable names as a convention. This is offputting at first but after you read enough Haskell, it ceases to be a problem. In addition there are several ad-hoc conventions that are typically adopted
a,b,c.. |
Type level variable |
x,y,z.. |
Value variables |
f,g,h.. |
Higher order function values |
x,y |
List head values |
xs,ys |
List tail values |
m |
Monadic type variable |
t |
Monad transformer variable |
e |
Exception value |
s |
Monad state value |
r |
Monad reader value |
t |
Foldable or Traversable type variable |
f |
Functor or applicative type variable |
mX |
Maybe variable |
Functions that end with a tick (like fold'
) are typically strict variants of a default lazy function.
Functions that end with a _ (like map_
) are typically variants of a function which discards the output and returns void.
Variables that are pluralized xs
, ys
typically refer to list tails.
Records that do not export their accessors will sometimes prefix them with underscores. These are sometimes interpreted by Template Haskell logic to produce derived field accessors.
Predicates will often prefix their function names with is
, as in isPositive
.
Functions which result in an Applicative or Monad type will often suffix their name with a A for Applicative or M for Monad. For example:
Functions which have chirality in which they traverse a data structure (i.e. left-to-right or right-to-left) will often suffix the name with L or R for their iteration pattern. This is useful because often times these type signatures identical.
Functions working with mutable structures or monadic state will often adopt the following naming conventions:
Functions that are prefixed with with
typically take a value as their first argument and a function as their second argument returning the value with the function applied over some substructure as the result.
ghcid
ghcid is a lightweight IDE hook that allows continuous feedback whenever code is updated. It can be run from the command line in the root of the cabal
project directory by specifying a command to run (e.g. ghci
, cabal repl
, or stack repl
).
When a Haskell module is loaded into ghcid
, the code is evaluated in order to provide the user with any errors or warnings that would happen at compile time. When the developer edits and saves code loaded into ghcid
, the program automatically reloads and evaluates the code for errors and warnings.
HLint
HLint is a source linter for Haskell that provides a variety of hints on code improvements. It can be customised and configured with custom rules, on a per-project basis. HLint is configured through a hlint.yaml
file placed in the root of a project. To generate the default configuration run:
Custom errors can be added to this file in order to match and suggest custom changes of code from the left hand side match to the right hand side replacement:
HLint’s default is to warn on all possible failures. These can be disabled globally by adding ignore pragmas.
Or within specific modules by specifying the within
option.
See:
Docker Images
Haskell has stable Docker images that are widely used for deployments across Kubernetes and Docker environments. The two Dockerhub repositories of note are:
To import the official Haskell images with ghc
and cabal-install
include the following preamble in your Dockerfile with your desired GHC version.
FROM haskell:8.8.1
To import the stack images include the following preamble in your Dockerfile with your desired Stack resolver replaced.
FROM fpco/stack-build:lts-14.0
Continuous Integration
These days it is quite common to use cloud hosted continuous integration systems to test code from version control systems. There are many community contributed build scripts for different service providers, including the following:
- Travis CI for Cabal
- Travis CI for Stack
- Circle CI for Cabal & Stack
- Github Actions for Cabal & Stack
See also the official CI repository:
Ormolu
Ormolu is an opinionated Haskell source formatter that produces a canonical way of rendering the Haskell abstract syntax tree to text. This ensures that code shared amongst teams and checked into version control conforms to a single universal standard for whitespace and lexeme placing. This is similar to tools in other languages such as go fmt
.
For example running ormolu example.hs --inplace
on the following module:
Will rerender the file as:
Ormolu can be installed via a variety of mechanisms.
See:
Haddock
Haddock is the automatic documentation generation tool for Haskell source code, and it integrates with the usual cabal
toolchain. In this section, we will explore how to document code so that Haddock can generate documentation successfully.
Several frequent comment patterns are used to document code for Haddock. The first of these methods uses -- |
to delineate the beginning of a comment:
Multiline comments are also possible:
-- ^
is used to comment Constructors or Record fields:
Elements within a module (i.e. values, types, classes) can be hyperlinked by enclosing the identifier in single quotes:
Modules themselves can be referenced by enclosing them in double quotes:
haddock
also allows the user to include blocks of code within the generated documentation. Two methods of demarcating the code blocks exist in haddock
. For example, enclosing a code snippet in @
symbols marks it as a code block:
Similarly, it is possible to use bird tracks (>
) in a comment line to set off a code block.
Snippets of interactive shell sessions can also be included in haddock
documentation. In order to denote the beginning of code intended to be run in a REPL, the >>>
symbol is used:
Headers for specific blocks can be added by prefacing the comment in the module block with a *
:
Sections can also be delineated by $
blocks that pertain to references in the body of the module:
Links can be added with the following syntax:
Images can also be included, so long as the path is either absolute or relative to the directory in which haddock
is run.
haddock
options can also be specified with pragmas in the source, either at the module or project level.
ignore-exports | Ignores the export list and includes all signatures in scope. |
not-home | Module will not be considered in the root documentation. |
show-extensions | Annotates the documentation with the language extensions used. |
hide | Forces the module to be hidden from Haddock. |
prune | Omits definitions with no annotations. |
Unsafe Functions
As everyone eventually finds out there are several functions within the implementation of GHC (not the Haskell language) that can be used to subvert the type-system; these functions are marked with the prefix unsafe
. Unsafe functions exist only for when one can manually prove the soundness of an expression but can’t express this property in the type-system, or externalities to Haskell.
Using these functions to subvert the Haskell typesystem will cause all measure of undefined behavior with unimaginable pain and suffering, and so they are strongly discouraged. When initially starting out with Haskell there are no legitimate reasons to use these functions at all.
Monads form one of the core components for constructing Haskell programs. In their most general form monads are an algebraic building block that can give rise to ways of structuring control flow, handling data structures and orchestrating logic. Monads are a very general algebraic way of structuring code and have a certain reputation for being confusing. However their power and flexibility have become foundational to the way modern Haskell programs are structured.
There is a singular truth to keep in mind when learning monads.
A monad is just its algebraic laws. Nothing more, nothing less.
Eightfold Path to Monad Satori
Much ink has been spilled waxing lyrical about the supposed mystique of monads. Instead, I suggest a path to enlightenment:
- Don’t read the monad tutorials.
- No really, don’t read the monad tutorials.
- Learn about the Haskell typesystem.
- Learn what a typeclass is.
- Read the Typeclassopedia.
- Read the monad definitions.
- Use monads in real code.
- Don’t write monad-analogy tutorials.
In other words, the only path to understanding monads is to read the fine source, fire up GHC, and write some code. Analogies and metaphors will not lead to understanding.
Monad Myths
The following are all false:
- Monads are impure.
- Monads are about effects.
- Monads are about state.
- Monads are about imperative sequencing.
- Monads are about IO.
- Monads are dependent on laziness.
- Monads are a “back-door” in the language to perform side-effects.
- Monads are an embedded imperative language inside Haskell.
- Monads require knowing abstract mathematics.
- Monads are unique to Haskell.
Monad Methods
Monads are not complicated. They are implemented as a typeclass with two methods, return
and (>>=)
(pronounced “bind”). In order to implement a Monad instance, these two functions must be defined:
The first type signature in the Monad class definition is for return
. Any preconceptions one might have for the word “return” should be discarded. It has an entirely different meaning in the context of Haskell and acts very differently than in languages such as C, Python, or Java. Instead of being the final arbiter of what value a function produces, return
in Haskell injects a value of type a
into a monadic context (e.g., Maybe, Either, etc.), which is denoted as m a
.
The other function essential to implementing a Monad instance is (>>=)
. This infix function takes two arguments. On its left side is a value with type m a
, while on the right side is a function with type (a -> m b)
. The bind operation results in a final value of type m b
.
A third, auxiliary function ((>>)
) is defined in terms of the bind operation that discards its argument.
This definition says that (>>) has a left and right argument which are monadic with types m a
and m b
respectively, while the infix function yields a value of type m b
. The actual implementation of (>>) says that when m
is passed to (>>)
with k
on the right, the value k
will always be yielded.
Monad Laws
In addition to specific implementations of (>>=)
and return
, all monad instances must satisfy three laws.
Law 1
The first law says that when return a
is passed through (>>=)
into a function f
, this expression is exactly equivalent to f a
.
In discussing the next two laws, we’ll refer to a value m
. This notation is shorthand for a value wrapped in a monadic context. Such a value has type m a
, and could be represented more concretely by values like Nothing
, Just x
, or Right x
. It is important to note that some of these concrete instantiations of the value m
have multiple components. In discussing the second and third monad laws, we’ll see some examples of how this plays out.
Law 2
The second law states that a monadic value m
passed through (>>=)
into return
is exactly equivalent to itself. In other words, using bind to pass a monadic value to return
does not change the initial value.
A more explicit way to write the second Monad law exists. In this following example code, the first expression shows how the second law applies to values represented by non-nullary type constructors. The second snippet shows how a value represented by a nullary type constructor works within the context of the second law.
Law 3
While the first two laws are relatively clear, the third law may be more difficult to understand. This law states that when a monadic value m
is passed through (>>=)
to the function f
and then the result of that expression is passed to >>= g
, the entire expression is exactly equivalent to passing m
to a lambda expression that takes one parameter x
and outputs the function f
applied to x
. By the definition of bind, f x
must return a value wrapped in the same monad. Because of this property, the resultant value of that expression can be passed through (>>=)
to the function g
, which also returns a monadic value.
Again, it is possible to write this law with more explicit code. Like in the explicit examples for law 2, m
has been replaced by SomeMonad val
in order to be make it clear that there can be multiple components to a monadic value. Although little has changed in the code, it is easier to see that value –namely, val
– corresponds to the x
in the lambda expression. After SomeMonad val
is passed through (>>=)
to f
, the function f
operates on val
and returns a result still wrapped in the SomeMonad
type constructor. We can call this new value SomeMonad newVal
. Since it is still wrapped in the monadic context, SomeMonad newVal
can thus be passed through the bind operation into the function g
.
Monad law summary: Law 1 and 2 are identity laws (left and right identity respectively) and law 3 is the associativity law. Together they ensure that Monads can be composed and ‘do the right thing’.
See:
Do Notation
Monadic syntax in Haskell is written in a sugared form, known as do
notation. The advantages of this special syntax are that it is easier to write and often easier to read, and it is entirely equivalent to simply applying the monad operations. The desugaring is defined recursively by the rules:
Thus, through the application of the desugaring rules, the following expressions are equivalent:
do
a <- f -- f, g, and h are bound to the names a,
b <- g -- b, and c. These names are then passed
c <- h -- to 'return' to ensure that all values
return (a, b, c) -- are wrapped in the appropriate monadic
-- context
do { -- N.B. '{}' and ';' characters are
a <- f; -- rarely used in do-notation
b <- g;
c <- h;
return (a, b, c)
}
f >>= a ->
g >>= b ->
h >>= c ->
return (a, b, c)
If one were to write the bind operator as an uncurried function (which is not how Haskell uses it) the same desugaring might look something like the following chain of nested binds with lambdas.
In the do-notation, the monad laws from above are equivalently written:
Law 1
Law 2
Law 3
See:
Maybe Monad
The Maybe monad is the simplest first example of a monad instance. The Maybe monad models a computation which may fail to yield a value at any point during computation.
The Maybe type has two value constructors. The first, Just
, is a unary constructor representing a successful computation, while the second, Nothing
, is a nullary constructor that represents failure.
The monad instance describes the implementation of (>>=)
for Maybe
by pattern matching on the possible inputs that could be passed to the bind operation (i.e., Nothing
or Just x
). The instance declaration also provides an implementation of return
, which in this case is simply Just
.
The following code shows some simple operations to do within the Maybe monad.
In the above example, the value Just 3
is passed via (>>=)
to the lambda function x -> return (x + 1)
. x
refers to the Int
portion of Just 3
, and we can use x
in the second half of the lambda expression, return (x + 1)
which evaluates to Just 4
, indicating a successful computation.
In the second example, the value Nothing
is passed via (>>=)
to the same lambda function as in the previous example. However, according to the Maybe
Monad instance, whenever Nothing
is bound to a function, the expression’s result will be Nothing
.
Here, return
is applied to 4
and results in Just 4
.
The next code examples show the use of do
notation within the Maybe monad to do addition that might fail. Desugared examples are provided as well.
List Monad
The List monad is the second simplest example of a monad instance. As always, this monad implements both (>>=)
and return
.
The definition of bind says that when the list m
is bound to a function f
, the result is a concatenation of map f
over the list m
. The return
method simply takes a single value x
and injects into a singleton list [x]
.
In order to demonstrate the List
monad’s methods, we will define two values: m
and f
. m
is a simple list, while f
is a function that takes a single Int
and returns a two element list [1, 0]
.
When applied to bind, evaluation proceeds as follows:
m >>= f
==> [1,2,3,4] >>= x -> [1,0]
==> concat (map (x -> [1,0]) [1,2,3,4])
==> concat ([[1,0],[1,0],[1,0],[1,0]])
==> [1,0,1,0,1,0,1,0]
The list comprehension syntax in Haskell can be implemented in terms of the list monad. List comprehensions can be considered syntactic sugar for more obviously monadic implementations. Examples a
and b
illustrate these use cases.
The first example (a
) illustrates how to write a list comprehension. Although the syntax looks strange at first, there are elements of it that may look familiar. For instance, the use of <-
is just like bind in a do
notation: It binds an element of a list to a name. However, one major difference is apparent: a
seems to lack a call to return
. Not to worry, though, the []
fills this role. This syntax can be easily desugared by the compiler to an explicit invocation of return
. Furthermore, it serves to remind the user that the computation takes place in the List monad.
The second example (b
) shows the list comprehension above rewritten with do
notation:
The final examples are further illustrations of the List monad. The functions below each return a list of 3-tuples which contain the possible combinations of the three lists that get bound the names a
, b
, and c
. N.B.: Only values in the list bound to a
can be used in a
position of the tuple; the same fact holds true for the lists bound to b
and c
.
example :: [(Int, Int, Int)]
example = do
a <- [1,2]
b <- [10,20]
c <- [100,200]
return (a,b,c)
-- [(1,10,100),(1,10,200),(1,20,100),(1,20,200),(2,10,100),(2,10,200),(2,20,100),(2,20,200)]
desugared :: [(Int, Int, Int)]
desugared = [1, 2] >>= a ->
[10, 20] >>= b ->
[100, 200] >>= c ->
return (a, b, c)
-- [(1,10,100),(1,10,200),(1,20,100),(1,20,200),(2,10,100),(2,10,200),(2,20,100),(2,20,200)]
IO Monad
Perhaps the most (in)famous example in Haskell of a type that forms a monad is IO
. A value of type IO a
is a computation which, when performed, does some I/O before returning a value of type a
. These computations are called actions. IO actions executed in main
are the means by which a program can operate on or access information from the external world. IO actions allow the program to do many things, including, but not limited to:
- Print a
String
to the terminal - Read and parse input from the terminal
- Read from or write to a file on the system
- Establish an
ssh
connection to a remote computer - Take input from a radio antenna for signal processing
- Launch the missiles.
Conceptualizing I/O as a monad enables the developer to access information from outside the program, but also to use pure functions to operate on that information as data. The following examples will show how we can use IO actions and IO
values to receive input from stdin and print to stdout.
Perhaps the most immediately useful function for doing I/O in Haskell is putStrLn
. This function takes a String
and returns an IO ()
. Calling it from main
will result in the String
being printed to stdout followed by a newline character.
Here is some code that prints a couple of lines to the terminal. The first invocation of putStrLn
is executed, causing the String
to be printed to stdout. The result is bound to a lambda expression that discards its argument, and then the next putStrLn
is executed.
Another useful function is getLine
which has type IO String
. This function gets a line of input from stdin. The developer can then bind this line to a name in order to operate on the value within the program.
The code below demonstrates a simple combination of these two functions as well as desugaring IO
code. First, putStrLn
prints a String
to stdout to ask the user to supply their name, with the result being bound to a lambda that discards it argument. Then, getLine
is executed, supplying a prompt to the user for entering their name. Next, the resultant IO String
is bound to name
and passed to putStrLn
. Finally, the program prints the name to the terminal.
The next code block is the desugared equivalent of the previous example where the uses of (>>=)
are made explicit.
Our final example executes in the same way as the previous two examples. This example, though, uses the special (>>)
operator to take the place of binding a result to the lambda that discards its argument.
See:
What’s the point?
Although it is difficult, if not impossible, to touch, see, or otherwise physically interact with a monad, this construct has some very interesting implications for programmers. For instance, consider the non-intuitive fact that we now have a uniform interface for talking about three very different, but foundational ideas for programming: Failure, Collections and Effects.
Let’s write down a new function called sequence
which folds a function mcons
over a list of monadic computations. We can think of mcons
as analogous to the list constructor (i.e. (a : b : [])
) except it pulls the two list elements out of two monadic values (p
,q
) by means of bind. The bound values are then joined with the list constructor :
, before finally being rewrapped in the appropriate monadic context with return
.
What does this function mean in terms of each of the monads discussed above?
Maybe
For the Maybe monad, sequencing a list of values within the Maybe
context allows us to collect the results of a series of computations which can possibly fail. However, sequence
yields the aggregated values only if each computation succeeds. In other words, if even one of the Maybe
values in the initial list passed to sequence
is a Nothing
, the result of evaluating sequence
for the whole list will also be Nothing
.
List
The bind operation for the list monad forms the pairwise list of elements from the two operands. Thus, folding the binds contained in mcons
over a list of lists with sequence
implements the general Cartesian product for an arbitrary number of lists.
IO
Applying sequence
within the IO context results in still a different result. The function takes a list of IO actions, performs them sequentially, and then gives back the list of resulting values in the order sequenced.
So there we have it, three fundamental concepts of computation that are normally defined independently of each other actually all share this similar structure. This unifying pattern can be abstracted out and reused to build higher abstractions that work for all current and future implementations. If you want a motivating reason for understanding monads, this is it! These insights are the essence of what I wish I knew about monads looking back.
See:
Reader Monad
The reader monad lets us access shared immutable state within a monadic context.
A simple implementation of the Reader monad:
Writer Monad
The writer monad lets us emit a lazy stream of values from within a monadic context.
A simple implementation of the Writer monad:
This implementation is lazy, so some care must be taken that one actually wants to only generate a stream of thunks. Most often the lazy writer is not suitable for use, instead implement the equivalent structure by embedding some monomial object inside a StateT monad, or using the strict version.
State Monad
The state monad allows functions within a stateful monadic context to access and modify shared state.
The state monad is often mistakenly described as being impure, but it is in fact entirely pure and the same effect could be achieved by explicitly passing state. A simple implementation of the State monad takes only a few lines:
Why are monads confusing?
So many monad tutorials have been written that it begs the question: what makes monads so difficult when first learning Haskell? I hypothesize there are three aspects to why this is so:
- There are several levels of indirection with desugaring.
A lot of the Haskell we write is radically rearranged and transformed into an entirely new form under the hood.
Most monad tutorials will not manually expand out the do-sugar. This leaves the beginner thinking that monads are a way of dropping into a pseudo-imperative language inside of pure code and further fuels the misconception that specific instances like IO describe monads in their full generality. When in fact the IO monad is only one among many instances.
Being able to manually desugar is crucial to understanding.
- Infix operators for higher order functions are not common in other languages.
On the left hand side of the operator we have an m a
and on the right we have a -> m b
. Thus, this operator is asymmetric, utilizing a monadic value on the left and a higher order function on the right. Although some languages do have infix operators that are themselves higher order functions, it is still a rather rare occurrence.
Thus, with a function desugared, it can be confusing that (>>=)
operator is in fact building up a much larger function by composing functions together.
Written in prefix form, it becomes a little bit more digestible.
Perhaps even removing the operator entirely might be more intuitive coming from other languages.
- Ad-hoc polymorphism is not commonplace in other languages.
Haskell’s implementation of overloading can be unintuitive if one is not familiar with type inference. Indeed, newcomers to Haskell often believe they can gain an intuition for monads in a way that will unify their understanding of all monads. This is a fallacy, however, because any particular monad instance is merely an instantiation of the monad typeclass functions implemented for that particular type.
This is all abstracted away from the user, but the (>>=)
or bind
function is really a function of 3 arguments with the extra typeclass dictionary argument ($dMonad
) implicitly threaded around.
In general, this is true for all typeclasses in Haskell and it’s true here as well, except in the case where the parameter of the monad class is unified (through inference) with a concrete class instance.
Now, all of these transformations are trivial once we understand them, they’re just typically not discussed. In my opinion the fundamental fallacy of monad tutorials is not that intuition for monads is hard to convey (nor are metaphors required!), but that novices often come to monads with an incomplete understanding of points (1), (2), and (3) and then trip on the simple fact that monads are the first example of a Haskell construct that is the confluence of all three.
Thus we make monads more difficult than they need to be. At the end of the day they are simple algebraic critters.
mtl / transformers
The descriptions of Monads in the previous chapter are a bit of a white lie. Modern Haskell monad libraries typically use a more general form of these, written in terms of monad transformers which allow us to compose monads together to form composite monads.
Imagine if you had an application that wanted to deal with a Maybe monad wrapped inside a State Monad, all wrapped inside the IO monad. This is the problem that monad transformers solve, a problem of composing different monads. At their core, monad transformers allow us to nest monadic computations in a stack with an interface to exchange values between the levels, called lift:
In production code, the monads mentioned previously may actually be their more general transformer form composed with the Identity
monad.
The following table shows the relationships between these forms:
Maybe | MaybeT | Maybe a |
m (Maybe a) |
Reader | ReaderT | r -> a |
r -> m a |
Writer | WriterT | (a,w) |
m (a,w) |
State | StateT | s -> (a,s) |
s -> m (a,s) |
Just as the base monad class has laws, monad transformers also have several laws:
Law #1
Law #2
Or equivalently:
Law #1
Law #2
It’s useful to remember that transformers compose outside-in but are unrolled inside out.
Transformers
The lift definition provided above comes from the transformers
library along with an IO-specialized form called liftIO
:
These definitions rely on the following typeclass definitions, which describe composing one monad with another monad (the “t” is the transformed second monad):
Basics
The most basic use requires us to use the T-variants for each of the monad transformers in the outer layers and to explicitly lift
and return
values between the layers. Monads have kind (* -> *)
, so monad transformers which take monads to monads have ((* -> *) -> * -> *)
:
For example, if we wanted to form a composite computation using both the Reader and Maybe monads, using MonadTrans
we could use Maybe inside of a ReaderT
to form ReaderT t Maybe a
.
The fundamental limitation of this approach is that we find ourselves lift.lift.lift
ing and return.return.return
ing a lot.
mtl
The mtl library is the most commonly used interface for these monad tranformers, but mtl depends on the transformers library from which it generalizes the “basic” monads described above into more general transformers, such as the following:
This solves the “lift.lift.lifting” problem introduced by transformers.
ReaderT
By way of an example there exist three possible forms of the Reader monad. The first is the primitive version which no longer exists, but which is useful for understanding the underlying ideas. The other two are the transformers and mtl variants.
Reader
ReaderT
MonadReader
So, hypothetically the three variants of ask would be:
In practice the mtl
variant is the one commonly used in Modern Haskell.
Newtype Deriving
Newtype deriving is a common technique used in combination with the mtl
library and as such we will discuss its use for transformers in this section.
As discussed in the newtypes section, newtypes let us reference a data type with a single constructor as a new distinct type, with no runtime overhead from boxing, unlike an algebraic datatype with a single constructor. Newtype wrappers around strings and numeric types can often drastically reduce accidental errors.
Consider the case of using a newtype to distinguish between two different text blobs with different semantics. Both have the same runtime representation as a text object, but are distinguished statically, so that plaintext can not be accidentally interchanged with encrypted text.
This is a surprisingly powerful tool as the Haskell compiler will refuse to compile any function which treats Cryptotext as Plaintext or vice versa!
The other common use case is using newtypes to derive logic for deriving custom monad transformers in our business logic. Using -XGeneralizedNewtypeDeriving
we can recover the functionality of instances of the underlying types composed in our transformer stack.
Using newtype deriving with the mtl library typeclasses we can produce flattened transformer types that don’t require explicit lifting in the transform stack. For example, here is a little stack machine involving the Reader, Writer and State monads.
{-# LANGUAGE GeneralizedNewtypeDeriving #-}
import Control.Monad.Reader
import Control.Monad.Writer
import Control.Monad.State
type Stack = [Int]
type Output = [Int]
type Program = [Instr]
type VM a = ReaderT Program (WriterT Output (State Stack)) a
newtype Comp a = Comp { unComp :: VM a }
deriving (Functor, Applicative, Monad, MonadReader Program, MonadWriter Output, MonadState Stack)
data Instr = Push Int | Pop | Puts
evalInstr :: Instr -> Comp ()
evalInstr instr = case instr of
Pop -> modify tail
Push n -> modify (n:)
Puts -> do
tos <- gets head
tell [tos]
eval :: Comp ()
eval = do
instr <- ask
case instr of
[] -> return ()
(i:is) -> evalInstr i >> local (const is) eval
execVM :: Program -> Output
execVM = flip evalState [] . execWriterT . runReaderT (unComp eval)
program :: Program
program = [
Push 42,
Push 27,
Puts,
Pop,
Puts,
Pop
]
main :: IO ()
main = mapM_ print $ execVM program
Pattern matching on a newtype constructor compiles into nothing. For example theextractB
function below does not scrutinize the MkB
constructor like extractA
does, because MkB
does not exist at runtime; it is purely a compile-time construct.
Efficiency
The second monad transformer law guarantees that sequencing consecutive lift operations is semantically equivalent to lifting the results into the outer monad.
Although they are guaranteed to yield the same result, the operation of lifting the results between the monad levels is not without cost and crops up frequently when working with the monad traversal and looping functions. For example, all three of the functions on the left below are less efficient than the right hand side which performs the bind in the base monad instead of lifting on each iteration.
Monad Morphisms
Although the base monad transformer package provides a MonadTrans
class for lifting to another monad:
But oftentimes we need to work with and manipulate our monad transformer stack to either produce new transformers, modify existing ones or extend an upstream library with new layers. The mmorph
library provides the capacity to compose monad morphism transformation directly on transformer stacks. This is achieved primarily by use of the hoist
function which maps a function from a base monad into a function over a transformed monad.
Hoist takes a monad morphism (a mapping from a m a
to a n a
) and applies in on the inner value monad of a transformer stack, transforming the value under the outer layer.
The monad morphism generalize
takes an Identity monad into any another monad m
.
For example, it generalizes State s a
(which is StateT s Identity a
) to StateT s m a
.
So we can generalize an existing transformer to lift an IO layer onto it.
See:
Effect Systems
The mtl model has several properties which make it suboptimal from a theoretical perspective. Although it is used widely in production Haskell we will discuss its shortcomings and some future models called effect systems.
Extensibility
When you add a new custom transformer inside of our business logic we’ll typically have to derive a large number of boilerplate instances to compose it inside of existing mtl transformer stack. For example adding MonadReader
instance for n number of undecidable instances that do nothing but mostly lifts. You can see this massive boilerplate all over the design of the mtl
library and its transitive dependencies.
This is called the n2 instance problem or the instance boilerplate problem and remains an open problem of mtl.
Composing Transformers
Effects don’t generally commute from a theoretical perspective and as such monad transformer composition is not in general commutative. For example stacking State
and Except
is not commutative:
In addition, the standard method of deriving mtl classes for a transformer stack breaks down when using transformer stacks with the same monad at different layers of the stack. For example stacking multiple State
transformers is a pattern that shows up quite frequently.
In order to get around this you would have to handwrite the instances for this transformer stack and manually lift anytime you perform a State action. This is a suboptimal design and difficult to route around without massive boilerplate.
While these problems exist, most users of mtl don’t implement new transformers at all and can get by. However in recent years there have been written many other libraries that have explored the design space of alternative effect modeling systems. These systems are still quite early compared to the mtl
but some are able to avoid some of the shortcomings of mtl
in favour of newer algebraic models of effects. The two most commonly used libraries are:
polysemy
fused-effects
Polysemy
Polysemy is a new effect system library based on the free-monad approach to modeling effects. The library uses modern type system features to model effects on top of a Sem
monad. The monad will have a members constraint type which constraints a parameter r
by a type-level list of effects in the given unit of computation.
For example we seamlessly mix and match error handling, tracing, and stateful updates inside of one computation without the new to create a layered monad. This would look something like the following:
These effects can then be evaluated using an interpreter function which unrolls and potentially evaluates the effects of the Sem
free monad. Some of these interpreters for tracing, state and error are similar to the evaluations for monad transformers but evaluate one layer of type-level list of the effect stack.
The resulting Sem
monad with a single field can then be lowered into a single resulting monad such as IO or Either.
The library provides rich set of of effects that can replace many uses of monad transformers.
Polysemy.Async
- Asynchronous computationsPolysemy.AtomicState
- Atomic operationsPolysemy.Error
- Error handlingPolysemy.Fail
- Computations that failPolysemy.IO
- Monadic IOPolysemy.Input
- Input effectsPolysemy.Output
- Output effectsPolysemy.NonDet
- Non-determinism effectPolysemy.Reader
- Contextual state a la Reader monadPolysemy.Resource
- Resources with finalizersPolysemy.State
- Stateful effectsPolysemy.Trace
- Tracing effectPolysemy.Writer
- Accumulation effect a la Writer monad
For example for a simple stateful computation with only a single effect.
And a more complex example which combines multiple effects:
Polysemy will require the following language extensions to operate:
The use of free-monads is not entirely without cost, and there are experimental GHC plugins which can abstract away some of the overhead from the effect stack. Code thats makes use of polysemy should enable the following GHC flags to enable aggressive typeclass specialisation:
-flate-specialise
-fspecialise-aggressively
Fused Effects
Fused-effects is an alternative approach to effect systems based on an algebraic effects model. Unlike polysemy, fused-effects does not use a free monad as an intermediate form. Fused-effects has competative performance compared with mtl and doesn’t require additional GHC plugins or extension compiler fusion rules to optimise away the abstraction overhead.
The fused-effects
library exposes a constraint kind called Has
which annotates a type signature that contains effectful logic. In this signature m
is called the carrier for the sig
effect signature containing the eff
effect.
For example the traditional State effect is modeled by the following datatype with three parameters. The s
parameter is the state object, the m
is the effect parameter. This exposes the same interface as Control.Monad.State
except for the Has
constraint instead.
The Carrier
for the State effect is defined as StateC
and the evaluators for the state carrier are defined in the same interface as mtl
except they evaluate into a result containing the effect parameter m
.
The evaluators for the effect lift monadic actions from an effectful computation.
Fused-effects requires the following language extensions to operate.
Minimal Example
A minimal example using the State
effect to track stateful updates to a single integral value.
The evaluation of this monadic state block results in a m Integer
with the Algebra and Effect context. This can then be evaluated into either Identity
or IO
using run
.
Composite Effects
Consider a more complex example which combines exceptions with Throw
effect with State
. Importantly note that functions runThrow
and evalState
cannot infer the state type from the signature alone and thus require additional annotations. This differs from mtl
which typically has more optimal inference.
Philosophy
Haskell takes a drastically different approach to language design than most other languages as a result of being the synthesis of input from industrial and academic users. GHC allows the core language itself to be extended with a vast range of opt-in flags which change the semantics of the language on a per-module or per-project basis. While this does add a lot of complexity at first, it also adds a level of power and flexibility for the language to evolve at a pace that is unrivaled in the broader space of programming language design.
Classes
It’s important to distinguish between different classes of GHC language extensions: general and specialized.
The inherent problem with classifying extensions into general and specialized categories is that it is a subjective classification. Haskellers who do theorem proving research will have a very different interpretation of Haskell than people who do web programming. Thus, we will use the following classifications:
- Benign implies both that importing the extension won’t change the semantics of the module if not used and that enabling it makes it no easier to shoot yourself in the foot.
- Historical implies that one shouldn’t use this extension, it is in GHC purely for backwards compatibility. Sometimes these are dangerous to enable.
- Steals syntax means that enabling this extension causes certain code, that is valid in vanilla Haskell, to be no longer be accepted. For example,
f $(a)
is the same asf $ (a)
in Haskell98, butTemplateHaskell
will interpret$(a)
as a splice.
The golden source of truth for language extensions is the official GHC user’s guide which contains a plethora of information on the details of these extensions.
Extension Dependencies
Some language extensions will implicitly enable other language extensions for their operation. The table below shows the dependencies between various extensions and which sets are implied.
TypeFamilyDependencies | TypeFamilies |
TypeInType | PolyKinds, DataKinds, KindSignatures |
PolyKinds | KindSignatures |
ScopedTypeVariables | ExplicitForAll |
RankNTypes | ExplicitForAll |
ImpredicativeTypes | RankNTypes |
TemplateHaskell | TemplateHaskellQuotes |
Strict | StrictData |
RebindableSyntax | NoImplicitPrelude |
TypeOperators | ExplicitNamespaces |
LiberalTypeSynonyms | ExplicitForAll |
ExistentialQuantification | ExplicitForAll |
GADTs | MonoLocalBinds, GADTSyntax |
DuplicateRecordFields | DisambiguateRecordFields |
RecordWildCards | DisambiguateRecordFields |
DeriveTraversable | DeriveFoldable, DeriveFunctor |
MultiParamTypeClasses | ConstrainedClassMethods |
DerivingVia | DerivingStrategies |
FunctionalDependencies | MultiParamTypeClasses |
FlexibleInstances | TypeSynonymInstances |
TypeFamilies | MonoLocalBinds, KindSignatures, ExplicitNamespaces |
IncoherentInstances | OverlappingInstances |
The Benign
It’s not obvious which extensions are the most common but it’s fairly safe to say that these extensions are benign and are safely used extensively:
- NoImplicitPrelude
- OverloadedStrings
- LambdaCase
- FlexibleContexts
- FlexibleInstances
- GeneralizedNewtypeDeriving
- TypeSynonymInstances
- MultiParamTypeClasses
- FunctionalDependencies
- NoMonomorphismRestriction
- GADTs
- BangPatterns
- DeriveGeneric
- DeriveAnyClass
- DerivingStrategies
- ScopedTypeVariables
The Advanced
These extensions are typically used by advanced projects that push the limits of what is possible with Haskell to enforce complex invariants and very type-safe APIs.
- PolyKinds
- DataKinds
- DerivingVia
- GADTs
- RankNTypes
- ExistentialQuantification
- TypeFamilies
- TypeOperators
- TypeApplications
- UndecidableInstances
The Lowlevel
These extensions are typically used by low-level libraries that are striving for optimal performance or need to integrate with foreign functions and native code. Most of these are used to manipulate base machine types and interface directly with the low-level byte representations of data structures.
- CPP
- BangPatterns
- CApiFFI
- Strict
- StrictData
- RoleAnnotations
- ForeignFunctionInterface
- InterruptibleFFI
- UnliftedFFITypes
- MagicHash
- UnboxedSums
- UnboxedTuples
The Dangerous
GHC’s typechecker sometimes casually tells us to enable language extensions when it can’t solve certain problems. Unless you know what you’re doing, these extensions almost always indicate a design flaw and shouldn’t be turned on to remedy the error at hand, as much as GHC might suggest otherwise!
- AllowAmbigiousTypes
- DatatypeContexts
- OverlappingInstances
- IncoherentInstances
- ImpredicativeTypes
NoMonomorphismRestriction
The NoMonomorphismRestriction allows us to disable the monomorphism restriction typing rule GHC uses by default. See monomorphism restriction.
For example, if we load the following module into GHCi
And then we attempt to call the function bar
with a Double, we get a type error:
The problem is that GHC has inferred an overly specific type:
We can prevent GHC from specializing the type with this extension:
Now everything will work as expected:
ExtendedDefaultRules
In the absence of explicit type signatures, Haskell normally resolves ambiguous literals using several defaulting rules. When an ambiguous literal is typechecked, if at least one of its typeclass constraints is numeric and all of its classes are standard library classes, the module’s default list is consulted, and the first type from the list that will satisfy the context of the type variable is instantiated. For instance, given the following default rules
The following set of heuristics is used to determine what to instantiate the ambiguous type variable to.
- The type variable
a
appears in no other constraints - All the classes
Ci
are standard. - At least one of the classes
Ci
is numerical.
The standard default
definition is implicitly defined as (Integer, Double)
This is normally fine, but sometimes we’d like more granular control over defaulting. The -XExtendedDefaultRules
loosens the restriction that we’re constrained with working on Numerical typeclasses and the constraint that we can only work with standard library classes. For example, if we’d like to have our string literals (using -XOverloadedStrings
) automatically default to the more efficient Text
implementation instead of String
we can twiddle the flag and GHC will perform the right substitution without the need for an explicit annotation on every string literal.
For code typed at the GHCi prompt, the -XExtendedDefaultRules
flag is always on, and cannot be switched off.
Safe Haskell
The Safe Haskell language extensions allow us to restrict the use of unsafe language features using -XSafe
which restricts the import of modules which are themselves marked as Safe. It also forbids the use of certain language extensions (-XTemplateHaskell
) which can be used to produce unsafe code. The primary use case of these extensions is security auditing of codebases for compliance purposes.
See: Safe Haskell
PartialTypeSignatures
Normally a function is either given a full explicit type signature or none at all. The partial type signature extension allows something in between.
Partial types may be used to avoid writing uninteresting pieces of the signature, which can be convenient in development:
If the -Wpartial-type-signatures
GHC option is set, partial types will still trigger warnings.
See:
RecursiveDo
Recursive do notation allows for the use of self-reference expressions on both sides of a monadic bind. For instance the following example uses lazy evaluation to generate an infinite list. This is sometimes used to instantiate a cyclic datatype inside a monadic context where the datatype needs to hold a reference to itself.
ApplicativeDo
By default GHC desugars do-notation to use implicit invocations of bind and return. With normal monad sugar the following…
… desugars into:
With ApplicativeDo
this instead desugars into use of applicative combinators and a laxer Applicative constraint.
Which is equivalent to the traditional notation.
PatternGuards
Pattern guards are an extension to the pattern matching syntax. Given a <-
pattern qualifier, the right hand side is evaluated and matched against the pattern on the left. If the match fails then the whole guard fails and the next equation is tried. If it succeeds, then the appropriate binding takes place, and the next qualifier is matched.
ViewPatterns
View patterns are like pattern guards that can be nested inside of other patterns. They are a convenient way of pattern-matching against values of algebraic data types.
TupleSections
The TupleSections syntax extension allows tuples to be constructed similar to how operator sections. With this extension enabled, tuples of arbitrary size can be “partially” specified with commas and values given for specific positions in the tuple. For example for a 2-tuple:
An example for a 7-tuple where three values are specified in the section.
Postfix Operators
The postfix operators extensions allows user-defined operators that are placed after expressions. For example, using this extension, we could define a postfix factorial function.
MultiWayIf
Multi-way if expands traditional if statements to allow pattern match conditions that are equivalent to a chain of if-then-else statements. This allows us to write “pattern matching predicates” on a value. This alters the syntax of Haskell language.
EmptyCase
GHC normally requires at least one pattern branch in a case statement; this restriction can be relaxed with the EmptyCase
language extension. The case statement then immediately yields a Non-exhaustive patterns in case
if evaluated. For example, the following will compile using this language pragma:
LambdaCase
For case statements, the language extension LambdaCase
allows the elimination of redundant free variables introduced purely for the case of pattern matching on.
Without LambdaCase:
With LambdaCase:
NumDecimals
The extension NumDecimals
allows the use of exponential notation for integral literals that are not necessarily floats. Without it, any use of exponential notation induces a Fractional class constraint.
PackageImports
The syntax language extension PackageImports
allows us to disambiguate hierarchical package names by their respective package key. This is useful in the case where you have two imported packages that expose the same module. In practice most of the common libraries have taken care to avoid conflicts in the namespace and this is not usually a problem in most modern Haskell.
For example we could explicitly ask GHC to resolve that Control.Monad.Error
package be drawn from the mtl
library.
RecordWildCards
Record wild cards allow us to expand out the names of a record as variables scoped as the labels of the record implicitly. The extension can be used to extract variables names into a scope and/or to assign to variables in a record drawing(?), aligning the record’s labels with the variables in scope for the assignment. The syntax introduced is the {..}
pattern selector as in the following example:
{-# LANGUAGE RecordWildCards #-}
{-# LANGUAGE OverloadedStrings #-}
import Data.Text
data Example = Example
{ e1 :: Int
, e2 :: Text
, e3 :: Text
} deriving (Show)
-- Extracting from a record using wildcards.
scope :: Example -> (Int, Text, Text)
scope Example {..} = (e1, e2, e3)
-- Assign to a record using wildcards.
assign :: Example
assign = Example {..}
where
(e1, e2, e3) = (1, "Kirk", "Picard")
NamedFieldPuns
NamedFieldPuns
provides alternative syntax for accessing record fields in a pattern match.
PatternSynonyms
Suppose we were writing a typechecker, and we needed to parse type signatures. One common solution would to include a TArr
to pattern match on type function signatures. Even though, technically it could be written in terms of more basic application of the (->)
constructor.
With pattern synonyms we can eliminate the extraneous constructor without losing the convenience of pattern matching on arrow types. We introduce a new pattern using the pattern
keyword.
So now we can write a deconstructor and constructor for the arrow type very naturally.
Pattern synonyms can be exported from a module like any other definition by prefixing them with the prefix pattern
.
DeriveFunctor
Many instances of functors over datatypes with parameters and trivial constructors are the result of trivially applying a function over the single constructor’s argument. GHC can derive this boilerplate automatically in deriving clauses if DeriveFunctor
is enabled.
DeriveFoldable
Similar to how Functors can be automatically derived, many instances of Foldable for types of kind * -> *
have instances that derive the functions:
foldMap
foldr
null
For instance if we have a custom rose tree and binary tree implementation we can automatically derive the fold functions for these datatypes automatically for us.
These will generate the following instances:
DeriveTraversable
Just as with Functor and Foldable, many Traversable
instances for single-paramater datatypes of kind * -> *
have trivial implementations of the traverse
function which can also be derived automatically. By enabling DeriveTraversable
we can use stock deriving to derive these instances for us.
DeriveGeneric
Data types in Haskell can derived by GHC with the DeriveGenerics extension which is able to define the entire structure of the Generic instance and associated type families. See Generics for more details on what these types mean.
For example the simple custom List type deriving Generic:
Will generate the following Generic
instance:
DeriveAnyClass
With -XDeriveAnyClass
we can derive any class. The deriving logic generates an instance declaration for the type with no explicitly-defined methods or with all instances having a specific default implementation given. These are used extensively with Generics when instances provide empty Minimal Annotations which are all derived from generic logic.
A contrived example of a class with an empty minimal set might be the following:
DuplicateRecordFields
GHC 8.0 introduced the DuplicateRecordFields
extensions which loosens GHC’s restriction on records in the same module with identical accessors. The precise type that is being projected into is now deferred to the callsite.
Using just DuplicateRecordFields
, projection is still not supported so the following will not work.
OverloadedLabels
GHC 8.0 also introduced the OverloadedLabels
extension which allows a limited form of polymorphism over labels that share the same name.
To work with overloaded label types we also need to enable several language extensions that allow us to use the promoted strings and multiparam typeclasses that underlay its implementation.
This is used in more advanced libraries like Selda which do object relational mapping between Haskell datatype fields and database columns.
See:
CPP
The C++ preprocessor is the fallback whenever we really need to separate out logic that has to span multiple versions of GHC and language changes while maintaining backwards compatibility. It can dispatch on the version of GHC being used to compile a module.
It can also demarcate code based on the operating system compiled on.
For another example, it can distinguish the version of the base library used.
One can also use the CPP extension to emit Haskell source at compile-time. This is used in some libraries which have massive boilerplate obligations. Of course, this can be abused quite easily and doing this sort of compile-time string-munging should be a last resort.
TypeApplications
The type system extension TypeApplications
allows you to use explicit annotations for subexpressions. For example if you have a subexpression which has the inferred type a -> b -> a
you can name the types of a
and b
by explicitly stating @Int @Bool
to assign a
to Int
and b
to Bool
. This is particularly useful when working with typeclasses where type inference cannot deduce the types of all subexpressions from the toplevel signature and results in an overly specific default. This is quite common when working with roundtrips of read
and show
. For example:
DerivingVia
DerivingVia
is an extension of GeneralizedNewtypeDeriving
. Just as newtype deriving allows us to derive instances in terms of instances for the underlying representation of the newtype, DerivingVia allows deriving instances by specifying a custom type which has a runtime representation equal to the desired behavior we’re deriving the instance for. The derived instance can then be coerced
to behave as if it were operating over the given type. This is a powerful new mechanism that allows us to derive many typeclasses in terms of other typeclasses.
DerivingStrategies
Deriving has proven a powerful mechanism to add typeclass instances and as such there have been a variety of bifurcations in its use. Since GHC 8.2 there are now four different algorithms that can be used to derive typeclass instances. These are enabled by different extensions and now have specific syntax for invoking each algorithm specifically. Turning on DerivingStrategies
allows you to disambiguate which algorithm GHC should use for individual class derivations.
stock
- Standard GHC builtin deriving (i.e.Eq
,Ord
,Show
)anyclass
- Deriving via minimal annotations with DeriveAnyClass.newtype
- Deriving with [GeneralizedNewtypeDeriving].via
- Deriving with DerivingVia.
These can be stacked and combined on top of a data or newtype declaration.
Historical Extensions
Several language extensions have either been absorbed into the core language or become deprecated in favor of others. Others are just considered misfeatures.
Rank2Types
- Rank2Types has been subsumed byRankNTypes
XPolymorphicComponents
- Was an implementation detail of higher-rank polymorphism that no longer exists.NPlusKPatterns
- These were largely considered an ugly edge-case of pattern matching language that was best removed.TraditionalRecordSyntax
- Traditional record syntax was an extension to the Haskell 98 specification for what we now consider standard record syntax.OverlappingInstances
- Subsumed by explicitOVERLAPPING
pragmas.IncoherentInstances
- Subsumed by explicitINCOHERENT
pragmas.NullaryTypeClasses
- Subsumed by explicit Multiparameter Typeclasses with no parameters.TypeInType
- Is deprecated in favour of the combination ofPolyKinds
andDataKinds
and extensions to the GHC typesystem after GHC 8.0.
Typeclasses are the bread and butter of abstractions in Haskell, and even out of the box in Haskell 98 they are quite powerful. However classes have grown quite a few extensions, additional syntax and enhancements over the years to augment their utility.
Standard Hierarchy
In the course of writing Haskell there are seven core instances you will use and derive most frequently. Each of them are lawful classes with several equations associated with their methods.
Semigroup
Monoid
Functor
Applicative
Monad
Foldable
Traversable
Instance Search
Whenever a typeclass method is invoked at a callsite, GHC will perform an instance search over all available instances defined for the given typeclass associated with the method. This instance search is quite similar to backward chaining in logic programming languages. The search is performed during compilation after all types in all modules are known and is performed globally across all modules and all packages available to be linked. The instance search can either result in no instances, a single instance or multiple instances which satisfy the conditions of the call site.
Orphan Instances
Normally typeclass definitions are restricted to be defined in one of two places:
- In the same module as the declaration of the datatype in the instance head.
- In the same module as the class declaration.
These two restrictions restrict the instance search space to a system where a solution (if it exists) can always be found. If we allowed instances to be defined in any modules then we could potentially have multiple class instances defined in multiple modules and the search would be ambiguous.
This restriction can however be disabled with the -fno-warn-orphans
flag.
This will allow you to define orphan instances in the current module. But beware this will make the instance search contingent on your import list and may result in clashes in your codebase where the linker will fail because there are multiple modules which define the same instance head.
When used appropriately this can be the way to route around the fact that upstream modules may define datatypes that you use, but they have not defined the instances for other downstream libraries that you also use. You can then write these instances for your codebase without modifying either upstream library.
Minimal Annotations
In the presence of default implementations for typeclass methods, there may be several ways to implement a typeclass. For instance Eq is entirely defined by either defining when two values are equal or not equal by implying taking the negation of the other. We can define equality in terms of non-equality and vice-versa.
Before 7.6.1 there was no way to specify what was the “minimal” definition required to implement a typeclass
Minimal pragmas are boolean expressions. For instance, with |
as logical OR
, either definition of the above functions must be defined. Comma indicates logical AND
where both definitions must be defined.
Compiling the -Wmissing-methods
will warn when an instance is defined that does not meet the minimal criterion.
TypeSynonymInstances
Normally type class definitions are restricted to being defined only over fully expanded types with all type synonym indirections removed. Type synonyms introduce a “naming indirection” that can be included in the instance search to allow you to write synonym instances for multiple synonyms which expand to concrete types.
This is used quite often in modern Haskell.
FlexibleInstances
Normally the head of a typeclass instance must contain only a type constructor applied to any number of type variables. There can be no nesting of other constructors or non-type variables in the head. The FlexibleInstances
extension loosens this restriction to allow arbitrary nesting and non-type variables to be mentioned in the head definition. This extension also implicitly enables TypeSynonymInstances
.
FlexibleContexts
Just as with instances, contexts normally are also constrained to consist entirely of constraints where a class is applied to just type variables. The FlexibleContexts
extension lifts this restriction and allows any type of type variable and nesting to occur the class constraint head. There is however still a global restriction that all class hierarchies must not contain cycles.
OverlappingInstances
Typeclasses are normally globally coherent, there is only ever one instance that can be resolved for a type unambiguously at any call site in the program. There are however extensions to loosen this restriction and perform more manual direction of the instance search.
Overlapping instances loosens the coherent condition (there can be multiple instances) but introduces a criterion that it will resolve to the most specific one.
Historically enabling on the module-level was not the best idea, since generally we define multiple classes in a module only a subset of which may be incoherent. As of GHC 7.10 we now have the capacity to just annotate instances with the OVERLAPPING
and INCOHERENT
inline pragmas.
IncoherentInstances
Incoherent instances loosens the restriction that there be only one specific instance, it will be chosen based on a more complex search procedure which tries to identify a prime instance based on information incorporated form OVERLAPPING
pragmas on instances in the search tree. Unless one is doing very advanced type-level programming use class constraints, this is usually a poor design decision and a sign to rethink the class hierarchy.
An example with INCOHERENT
annotations:
Haskell is a unique language that explores an alternative evaluation model called lazy evaluation. Lazy evaluation implies that expressions will be evaluated only when needed. In truth, this evaluation may even be indefinitely deferred. Consider the example in Haskell of defining an infinite list:
The primary advantage of lazy evaluation in the large is that algorithms that operate over both unbounded and bounded data structures can inhabit the same type signatures and be composed without any additional need to restructure their logic or force intermediate computations.
Still, it’s important to recognize that this is another subject on which much ink has been spilled. In fact, there is an ongoing discussion in the land of Haskell about the compromises between lazy and strict evaluation, and there are nuanced arguments for having either paradigm be the default.
Haskell takes a hybrid approach where it allows strict evaluation when needed while it uses laziness by default. Needless to say, we can always find examples where strict evaluation exhibits worse behavior than lazy evaluation and vice versa. These days Haskell can be both as lazy or as strict as you like, giving you options for however you prefer to program.
Languages that attempt to bolt laziness on to a strict evaluation model often bifurcate classes of algorithms into ones that are hand-adjusted to consume unbounded structures and those which operate over bounded structures. In strict languages, mixing and matching between lazy vs. strict processing often necessitates manifesting large intermediate structures in memory when such composition would “just work” in a lazy language.
By virtue of Haskell being the only language to actually explore this point in the design space, knowledge about lazy evaluation is not widely absorbed into the collective programmer consciousness and can often be non-intuitive to the novice. Some time is often needed to fully grok how lazy evaluation works
Strictness
For a more strict definition of strictnees, consider that there are several evaluation models for the lambda calculus:
- Strict - Evaluation is said to be strict if all arguments are evaluated before the body of a function.
- Non-strict - Evaluation is non-strict if the arguments are not necessarily evaluated before entering the body of a function.
These ideas give rise to several models, Haskell itself uses the call-by-need model.
Call-by-value | Strict | Arguments evaluated before function entered |
Call-by-name | Non-strict | Arguments passed unevaluated |
Call-by-need | Non-strict | Arguments passed unevaluated but an expression is only evaluated once |
Seq and WHNF
On the subject of laziness and evaluation, we have names for how fully evaluated an expression is. A term is said to be in weak head normal-form if the outermost constructor or lambda expression cannot be reduced further. A term is said to be in normal form if it is fully evaluated and all sub-expressions and thunks contained within are evaluated.
In Haskell, normal evaluation only occurs at the outer constructor of case-statements in Core. If we pattern match on a list, we don’t implicitly force all values in the list. An element in a data structure is only evaluated up to the outermost constructor. For example, to evaluate the length of a list we need only scrutinize the outer Cons constructors without regard for their inner values:
For example, in a lazy language the following program terminates even though it contains diverging terms.
In a strict language like OCaml (ignoring its suspensions for the moment), the same program diverges.
Thunks
In Haskell a thunk is created to stand for an unevaluated computation. Evaluation of a thunk is called forcing the thunk. The result is an update, a referentially transparent effect, which replaces the memory representation of the thunk with the computed value. The fundamental idea is that a thunk is only updated once (although it may be forced simultaneously in a multi-threaded environment) and its resulting value is shared when referenced subsequently.
The GHCi command :sprint
can be used to introspect the state of unevaluated thunks inside an expression without forcing evaluation. For instance:
While a thunk is being computed its memory representation is replaced with a special form known as blackhole which indicates that computation is ongoing and allows for a short circuit when a computation might depend on itself to complete.
The seq
function introduces an artificial dependence on the evaluation of order of two terms by requiring that the first argument be evaluated to WHNF before the evaluation of the second. The implementation of the seq
function is an implementation detail of GHC.
For one example where laziness can bite you, the infamous foldl is well-known to leak space when used carelessly and without several compiler optimizations applied. The strict foldl’ variant uses seq to overcome this.
In practice, a combination between the strictness analyzer and the inliner on -O2
will ensure that the strict variant of foldl
is used whenever the function is inlinable at call site so manually using foldl'
is most often not required.
Of important note is that GHCi runs without any optimizations applied so the same program that performs poorly in GHCi may not have the same performance characteristics when compiled with GHC.
BangPatterns
The extension BangPatterns
allows an alternative syntax to force arguments to functions to be wrapped in seq. A bang operator on an argument forces its evaluation to weak head normal form before performing the pattern match. This can be used to keep specific arguments evaluated throughout recursion instead of creating a giant chain of thunks.
This is desugared into code effectively equivalent to the following:
Function application to seq’d arguments is common enough that it has a special operator.
StrictData
As of GHC 8.0 strictness annotations can be applied to all definitions in a module automatically. In previous versions to make definitions strict it was necessary to use explicit syntactic annotations at call sites.
Enabling StrictData makes constructor fields strict by default on any module where the pragma is enabled:
Is equivalent to:
Strict
Strict implies -XStrictData
and extends strictness annotations to all arguments of functions.
Is equivalent to the following function declaration with explicit bang patterns:
On a module-level this effectively makes Haskell a call-by-value language with some caveats. All arguments to functions are now explicitly evaluated and all data in constructors within this module are in head normal form by construction.
Deepseq
There are often times when for performance reasons we need to deeply evaluate a data structure to normal form leaving no terms unevaluated. The deepseq
library performs this task.
The typeclass NFData
(Normal Form Data) allows us to seq all elements of a structure across any subtypes which themselves implement NFData.
To force a data structure itself to be fully evaluated we share the same argument in both positions of deepseq.
Irrefutable Patterns
A lazy pattern doesn’t require a match on the outer constructor, instead it lazily calls the accessors of the values as needed. In the presence of a bottom, we fail at the usage site instead of the outer pattern match.
The Debate
Laziness is a controversial design decision in Haskell. It is difficult to write production Haskell code that operates in constant memory without some insight into the evaluation model and the runtime. A lot of industrial codebases have a policy of marking all constructors as strict by default or enabling StrictData to prevent space leaks. If Haskell were being designed from scratch it probably would not choose laziness as the default model. Future implementations of Haskell compilers would not choose this point in the design space if given the option of breaking with the language specification.
There is a lot of fear, uncertainty and doubt spread about lazy evaluation that unfortunately loses the forest for the trees and ignores 30 years of advanced research on the type system. In industrial programming a lot of software is sold on the meme of being of fast instead of being correct, and lazy evaluation is an intellectually easy talking point about these upside-down priorities. Nevertheless the colloquial perception of laziness being “evil” is a meme that will continue to persist regardless of any underlying reality because software is intrinsically a social process.
What to Avoid?
Haskell being a 30 year old language has witnessed several revolutions in the way we structure and compose functional programs. Yet as a result several portions of the Prelude still reflect old schools of thought that simply can’t be removed without breaking significant parts of the ecosystem.
Currently it really only exists in folklore which parts to use and which not to use, although this is a topic that almost all introductory books don’t mention and instead make extensive use of the Prelude for simplicity’s sake.
The short version of the advice on the Prelude is:
- Avoid String.
- Use
fmap
instead ofmap
. - Use Foldable and Traversable instead of the Control.Monad, and Data.List versions of traversals.
- Avoid partial functions like
head
andread
or use their total variants. - Avoid exceptions, use ExceptT or Either instead.
- Avoid boolean blind functions.
The instances of Foldable for the list type often conflict with the monomorphic versions in the Prelude which are left in for historical reasons. So oftentimes it is desirable to explicitly mask these functions from implicit import and force the use of Foldable and Traversable instead.
Of course oftentimes one wishes to only use the Prelude explicitly and one can explicitly import it qualified and use the pieces as desired without the implicit import of the whole namespace.
What Should be in Prelude
To get work done on industrial projects you probably need the following libraries:
text
containers
unordered-containers
mtl
transformers
vector
filepath
directory
process
bytestring
optparse-applicative
unix
aeson
Custom Preludes
The default Prelude can be disabled in its entirety by twiddling the -XNoImplicitPrelude
flag which allows us to replace the default import entirely with a custom prelude. Many industrial projects will roll their own Prologue.hs
module which replaces the legacy prelude.
For example if we wanted to build up a custom project prelude we could construct a Prologue module and dump the relevant namespaces we want from base
into our custom export list. Using the module reexport feature allows us to create an Exports
namespace which contains our Prelude’s symbols. Every subsequent module in our project will then have import Prologue
as the first import.
Preludes
There are many approaches to custom preludes. The most widely used ones are all available on Hackage.
Different preludes take different approaches to defining what the Haskell standard library should be. Some are interoperable with existing code and others require an “all-in” approach that creates an ecosystem around it. Some projects are more community efforts and others are developed by consulting companies or industrial users wishing to standardise their commercial code.
In Modern Haskell there are many different perspectives on Prelude design and the degree to which more advanced ideas should be used. Which one is right for you is a matter of personal preference and constraints in your company.
Protolude
Protolude is a minimalist Prelude which provides many sensible defaults for writing modern Haskell and is compatible with existing code.
Protolude is one of the more conservative preludes and is developed by the author of this document.
See:
Partial Functions
A partial function is a function which doesn’t terminate and yield a value for all given inputs. Conversely a total function terminates and is always defined for all inputs. As mentioned previously, certain historical parts of the Prelude are full of partial functions.
The difference between partial and total functions is the compiler can’t reason about the runtime safety of partial functions purely from the information specified in the language and as such the proof of safety is left to the user to guarantee. They are safe to use in the case where the user can guarantee that invalid inputs cannot occur, but like any unchecked property its safety or not-safety is going to depend on the diligence of the programmer. This very much goes against the overall philosophy of Haskell and as such they are discouraged when not necessary.
A list of partial functions in the default prelude:
Partial for all inputs
error
undefined
fail
– ForMonad IO
Partial for empty lists
head
init
tail
last
foldl
foldr
foldl'
foldr'
foldr1
foldl1
cycle
maximum
minimum
Partial for Nothing
fromJust
Partial for invalid strings lists
read
Partial for infinite lists
sum
product
reverse
Partial for negative or unbounded numbers
(!)
(!!)
toEnum
genericIndex
Replacing Partiality
The Prelude has total variants of the historical partial functions (e.g. Text.Read.readMaybe
) in some cases, but often these are found in the various replacement preludes
The total versions provided fall into three cases:
May
- return Nothing when the function is not defined for the inputsDef
- provide a default value when the function is not defined for the inputsNote
- callerror
with a custom error message when the function is not defined for the inputs. This is not safe, but slightly easier to debug!
Boolean Blindness
Boolean blindness is a common problem found in many programming languages. Consider the following two definitions which deconstruct a Maybe value into a boolean. Is there anything wrong with the definitions and below and why is this not caught in the type system?
The problem with the Bool
type is that there is effectively no difference between True and False at the type level. A proposition taking a value to a Bool takes any information given and destroys it. To reason about the behavior we have to trace the provenance of the proposition we’re getting the boolean answer from, and this introduces a whole slew of possibilities for misinterpretation. In the worst case, the only way to reason about safe and unsafe use of a function is by trusting that a predicate’s lexical name reflects its provenance!
For instance, testing some proposition over a Bool value representing whether the branch can perform the computation safely in the presence of a null is subject to accidental interchange. Consider that in a language like C or Python testing whether a value is null is indistinguishable to the language from testing whether the value is not null. Which of these programs encodes safe usage and which segfaults?
From inspection we can’t tell without knowing how p is defined, the compiler can’t distinguish the two either and thus the language won’t save us if we happen to mix them up. Instead of making invalid states unrepresentable we’ve made the invalid state indistinguishable from the valid one!
The more desirable practice is to match on terms which explicitly witness the proposition as a type (often in a sum type) and won’t typecheck otherwise.
To be fair though, many popular languages completely lack the notion of sum types (the source of many woes in my opinion) and only have product types, so this type of reasoning sometimes has no direct equivalence for those not familiar with ML family languages.
In Haskell, the Prelude provides functions like isJust
and fromJust
both of which can be used to subvert this kind of reasoning and make it easy to introduce bugs and should often be avoided.
Foldable / Traversable
If coming from an imperative background retraining oneself to think about iteration over lists in terms of maps, folds, and scans can be challenging.
For a concrete example consider the simple arithmetic sequence over the binary operator (+)
:
Foldable and Traversable are the general interface for all traversals and folds of any data structure which is parameterized over its element type ( List, Map, Set, Maybe, …). These two classes are used everywhere in modern Haskell and are extremely important.
A foldable instance allows us to apply functions to data types of monoidal values that collapse the structure using some logic over mappend
.
A traversable instance allows us to apply functions to data types that walk the structure left-to-right within an applicative context.
The foldMap
function is extremely general and non-intuitively many of the monomorphic list folds can themselves be written in terms of this single polymorphic function.
foldMap
takes a function of values to a monoidal quantity, a functor over the values and collapses the functor into the monoid. For instance for the trivial Sum monoid:
For instance if we wanted to map a list of some abstract element types into a hashtable of elements based on pattern matching we could use it.
The full Foldable class (with all default implementations) contains a variety of derived functions which themselves can be written in terms of foldMap
and Endo
.
For example:
Most of the operations over lists can be generalized in terms of combinations of Foldable and Traversable to derive more general functions that work over all data structures implementing Foldable.
Unfortunately for historical reasons the names exported by Foldable quite often conflict with ones defined in the Prelude, either import them qualified or just disable the Prelude. The operations in the Foldable class all specialize to the same and behave the same as the ones in Prelude for List types.
The instances we defined above can also be automatically derived by GHC using several language extensions. The automatic instances are identical to the hand-written versions above.
The string situation in Haskell is a sad affair. The default String type is defined as linked list of pointers to characters which is an extremely pathological and inefficient way of representing textual data. Unfortunately for historical reasons large portions of GHC and Base depend on String.
The String problem is intrinsically linked to the fact that the default GHC Prelude provides a set of broken defaults that are difficult to change because GHC and the entire ecosystem historically depend on it. There are however high performance string libraries that can swapped in for the broken String
type and we will discuss some ways of working with high-performance and memory efficient replacements.
String
The default Haskell string type is implemented as a naive linked list of characters, this is hilariously terrible for most purposes but no one knows how to fix it without rewriting large portions of all code that exists, and simply nobody wants to commit the time to fix it. So it remains broken, likely forever.
However, fear not as there are are two replacement libraries for processing textual data: text
and bytestring
.
text
- Used for handling unicode data.bytestring
- Used for handling ASCII data that needs to interchange with C code or network protocols.
For each of these there are two variants for both text and bytestring.
- lazy - Lazy text objects are encoded as lazy lists of strict chunks of bytes.
- strict - Byte vectors are encoded as strict Word8 arrays of bytes or code points
Giving rise to the Cartesian product of the four common string types:
strict text `Da | ta.Text` |
lazy text `Da | ta.Text.Lazy` |
strict bytestring `Da | ta.ByteString` |
lazy bytestring `Da | ta.ByteString.Lazy` |
String Conversions
Conversions between strings types are done with several functions across the bytestring and text libraries. The mapping between text and bytestring is inherently lossy so there is some degree of freedom in choosing the encoding. We’ll just consider utf-8 for simplicity.
(From : left column, To : top row) Data.Text Data.Text.Lazy Data.ByteString Data.ByteString.Lazy ——————— ——— ————– ————— —————— Data.Text id fromStrict encodeUtf8 encodeUtf8 Data.Text.Lazy toStrict id encodeUtf8 encodeUtf8 Data.ByteString decodeUtf8 decodeUtf8 id fromStrict Data.ByteString.Lazy decodeUtf8 decodeUtf8 toStrict id
Be careful with the functions (decodeUtf8
, decodeUtf16LE
, etc.) as they are partial and will throw errors if the byte array given does not contain unicode code points. Instead use one of the following functions which will allow you to explicitly handle the error case:
OverloadedStrings
With the -XOverloadedStrings
extension string literals can be overloaded without the need for explicit packing and can be written as string literals in the Haskell source and overloaded via the typeclass IsString
. Sometimes this is desirable.
For instance:
We can also derive IsString for newtypes using GeneralizedNewtypeDeriving
, although much of the safety of the newtype is then lost if it is used interchangeable with other strings.
Import Conventions
Since there are so many modules that provide string datatypes, and these modules are used ubiquitously, some conventions are often adopted to import these modules as specific agreed-upon qualified names. In many Haskell projects you will see the following social conventions used for distinguish text types.
For datatypes:
For IO operations:
For encoding operations:
In addition many libraries and alternative preludes will define the following type synonyms:
Text
The Text
type is a packed blob of Unicode characters.
See: Text
Text.Builder
The Text.Builder allows the efficient monoidal construction of lazy Text types without having to go through inefficient forms like String or List types as intermediates.
ByteString
ByteStrings are arrays of unboxed characters with either strict or lazy evaluation.
Printf
Haskell also has a variadic printf
function in the style of C.
Overloaded Lists
It is ubiquitous for data structure libraries to expose toList
and fromList
functions to construct various structures out of lists. As of GHC 7.8 we now have the ability to overload the list syntax in the surface language with the typeclass IsList
.
For example we could write an overloaded list instance for hash tables that simply converts to the hash table using fromList
. Some math libraries that use vector-like structures will use overloaded lists in this fashion.
Regex
regex-tdfa
implements POSIX extended regular expressions. These can operate over any of the major string types and with OverloadedStrings enabled allows you to write well-typed regex expressions as strings.
Escaping Text
Haskell uses C-style single-character escape codes
n | U+000A | newline |