Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reimplement Parser #2149

Draft
wants to merge 94 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
94 commits
Select commit Hold shift + click to select a range
b0da809
Implement OpenQASM 3 lexer (#2129)
orpuente-MS Feb 2, 2025
fd616c4
Add initial AST and parser infrastructure (#2148)
idavis Feb 4, 2025
83332e6
Add ability to parse quantum decls and lit exprs (#2160)
idavis Feb 5, 2025
c73cdbc
Adding classical & io decls to the parser, stubbing out array decls (…
idavis Feb 7, 2025
17495f7
Fix panic in qasm3 lexer found by the fuzzer (#2170)
orpuente-MS Feb 11, 2025
c4343d0
Add fuzzing for qasm3 (#2167)
idavis Feb 11, 2025
78885b7
Implement Pratt Parsing for Qasm3 parser (#2166)
orpuente-MS Feb 11, 2025
4ea324d
Parse qasm3 switch statements (#2178)
orpuente-MS Feb 12, 2025
7ea14c1
Add subroutine, return, and gate defs, externs, and old style decls (…
idavis Feb 12, 2025
440a42c
Add array and measurement declaration statements (#2180)
orpuente-MS Feb 13, 2025
9c342f6
parse if, for, and while statements
orpuente-MS Feb 19, 2025
c3d7548
fix range expression
orpuente-MS Feb 20, 2025
d4fcdc8
update for loop unit tests
orpuente-MS Feb 20, 2025
2eb0759
add continue statements
orpuente-MS Feb 20, 2025
ba14cb8
update completions unit tests
orpuente-MS Feb 20, 2025
b28ac61
add break statements
orpuente-MS Feb 20, 2025
8b2011f
fix assignment expressions and add expression statements
orpuente-MS Feb 20, 2025
6fc03cf
add end stmt
orpuente-MS Feb 20, 2025
683d132
add alias declarations
orpuente-MS Feb 20, 2025
34c8599
format alias.rs file
orpuente-MS Feb 20, 2025
89b29b4
fixes during PR review with swernli
orpuente-MS Feb 20, 2025
9642239
gate calls
orpuente-MS Feb 24, 2025
4aaf8fd
update expect tests
orpuente-MS Feb 25, 2025
0c39f49
gate-call qubit args should be comma separated
orpuente-MS Feb 25, 2025
6be9453
add barrier, box, calgrammar, cal, defcal, delay, measure arrow, and …
orpuente-MS Feb 25, 2025
c146bd4
update completions tests
orpuente-MS Feb 25, 2025
3ceedb8
add unit tests
orpuente-MS Feb 25, 2025
f42289e
fix formatting
orpuente-MS Feb 25, 2025
ddbb48a
update completions tests
orpuente-MS Feb 25, 2025
ff2db3d
update unit tests
orpuente-MS Feb 25, 2025
dbe31d8
add support for timing literals
orpuente-MS Feb 26, 2025
7aa42ac
improve TODO messages
orpuente-MS Feb 26, 2025
8dd9112
address comments in PR review
orpuente-MS Feb 26, 2025
7df17ce
add gphase
orpuente-MS Feb 27, 2025
f12c6f3
add unit test for box with designator
orpuente-MS Feb 27, 2025
19d0db3
require exactly one angle argument in `gphase`
orpuente-MS Feb 27, 2025
610ff6b
fix parse_include and parse_cal_grammar
orpuente-MS Feb 27, 2025
3a70241
PR review fixes
orpuente-MS Feb 27, 2025
23d2ed6
fixes during PR review
orpuente-MS Feb 28, 2025
6c4f17f
fixes during PR review
orpuente-MS Feb 28, 2025
482d56e
add unit tests for gate_call
orpuente-MS Feb 28, 2025
35528fa
change unit tests names
orpuente-MS Feb 28, 2025
8b4f4f7
format file
orpuente-MS Feb 28, 2025
9371b43
disambiguate between cast expr_stmts and classical decls
orpuente-MS Feb 28, 2025
f6786e9
update cast unit tests
orpuente-MS Feb 28, 2025
8c3eed4
make expr unit tests also run for expr_stmts by adding a semicolon at…
orpuente-MS Feb 28, 2025
7ba15c6
fix formatting
orpuente-MS Feb 28, 2025
be8f57c
fix lexer bug
orpuente-MS Mar 1, 2025
6dcccc7
format code
orpuente-MS Mar 1, 2025
4f6d5c0
fix lexer bug and remove `second` from cooked lexer
orpuente-MS Mar 1, 2025
fa78d24
update test
orpuente-MS Mar 1, 2025
34fa49b
remove extra scope
orpuente-MS Mar 3, 2025
23327c1
Tidy up Display functions in QASM3 parser (#2209)
orpuente-MS Mar 5, 2025
c2d4051
Add initial semantic analysis/transform (#2214)
idavis Mar 7, 2025
ea70d7c
Make Assign and AssignOp valid only in expression statements (#2215)
orpuente-MS Mar 8, 2025
5480691
Make assignment a StmtKind (#2216)
orpuente-MS Mar 11, 2025
e687817
Add grammar docstrings to QASM3 parser (#2222)
orpuente-MS Mar 12, 2025
1c16710
Implement base declarations and binary expression lowering (#2221)
idavis Mar 12, 2025
a8852c7
Make control flow stmts use Stmt instead of List<Stmt> for their bodi…
orpuente-MS Mar 13, 2025
3848f81
Update cross file spans, separate parse/semantic result blurring (#2227)
idavis Mar 13, 2025
4f352af
Lower control flow stmts in QASM3 parser (#2232)
orpuente-MS Mar 17, 2025
95a4249
Adding new compiler, lowerer is now infallible (#2239)
idavis Mar 18, 2025
844be1b
Unify compilation and error propagation. (#2247)
idavis Mar 21, 2025
ae8e060
Add gate calls and the AST items it depends on to the new QASM3 compi…
orpuente-MS Mar 24, 2025
2d67664
Removing old test
idavis Mar 24, 2025
d93f2f8
Parsing now bundles IO source loading errors into parse errors. (#2252)
idavis Mar 25, 2025
313b7af
Compile gphase, gatedef, and control flow statements (#2254)
orpuente-MS Mar 27, 2025
0fd5cd5
QASM3 - Add implicit casts to function and gate arguments (#2257)
orpuente-MS Mar 27, 2025
d74fe1b
QASM3 - simple index expr (#2258)
orpuente-MS Mar 27, 2025
9ebe1f0
Add angle support to the new compiler (#2267)
orpuente-MS Mar 31, 2025
cbf1e12
Lower and compile complex binary ops (#2268)
orpuente-MS Apr 1, 2025
30f1334
Fixing angle input/output (#2269)
idavis Apr 1, 2025
67b0161
Fix scoping resolution for defs
idavis Apr 1, 2025
828d570
functions and operations with const eval (#2270)
orpuente-MS Apr 1, 2025
48d6784
Compile annotations into attributes (#2271)
orpuente-MS Apr 1, 2025
f348aec
unignore tests
orpuente-MS Apr 1, 2025
3dbb16e
add simulatable intrinsic QIR unit tests
orpuente-MS Apr 1, 2025
257ccd9
clippy lints
orpuente-MS Apr 2, 2025
79d42f5
apply cargo fmt
orpuente-MS Apr 2, 2025
a6456dd
make const measurement a parser error
orpuente-MS Apr 2, 2025
f8d9c7c
do not generate functors when `@SimulatableIntrinsic` is present
orpuente-MS Apr 2, 2025
bf3a82f
cargo fmt
orpuente-MS Apr 2, 2025
cbe4fd2
break and continue stmts
orpuente-MS Apr 2, 2025
6a0386d
lower duration literals
orpuente-MS Apr 3, 2025
8874f88
use `Type::Void` instead of `Option::None` to represent no return
orpuente-MS Apr 3, 2025
cabf327
return stmt casts to the return type of the function
orpuente-MS Apr 3, 2025
a5c00fd
fix clippy warning
orpuente-MS Apr 3, 2025
ae28d80
add assign_op complex tests
orpuente-MS Apr 3, 2025
914c30f
mark assigning_uint_to_negative_lit_results_in_semantic_error as ignore
orpuente-MS Apr 3, 2025
af0bd05
Unignore unit tests; lower and compile missing items (#2272)
orpuente-MS Apr 3, 2025
a551d83
lower extern
orpuente-MS Apr 3, 2025
d1fb2d7
extern unit tests
orpuente-MS Apr 3, 2025
66f67dd
Lower extern declaration (#2274)
orpuente-MS Apr 3, 2025
34ce0a7
Better error messages for const evaluator (#2277)
orpuente-MS Apr 4, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
38 changes: 21 additions & 17 deletions .github/workflows/fuzz.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ env:
TMIN_LOG_FNAME: fuzz.tmin.log # File name to redirect the fuzzing input minimization log to.
GH_ISSUE_TEMPLATE_RFPATH: .github/ISSUE_TEMPLATE/fuzz_bug_report.md
# GitHub issue template rel file path.
TARGET_NAME: compile # Fuzzing target name. Fuzzes the `compile` func of the Q# compiler.
ARTIFACTS_RDPATH: fuzz/artifacts # Fuzzing artifacts rel dir path.
SEEDS_RDPATH: fuzz/seed_inputs # Fuzzing seed inputs rel dir path.
SEEDS_FNAME: list.txt # Fuzzing seed inputs list file name.
Expand All @@ -31,11 +30,15 @@ jobs:
fuzz:
name: Fuzzing
strategy:
fail-fast: false
matrix:
os: [ubuntu-latest] # Fuzzing is not supported on Win. The macos is temporarily removed
# because of low availability.
runs-on: ${{ matrix.os }}
target_name: [qsharp, qasm3]

runs-on: ${{ matrix.os }}
permissions:
issues: write
steps:
- name: Install and Configure Tools
run: |
Expand All @@ -49,29 +52,30 @@ jobs:
submodules: "true"

- name: Gather the Seed Inputs
if: matrix.target_name == 'qsharp'
run: |
cd $OWNER_RDPATH # Enter the dir containing the fuzzing infra.

# Clone the submodules of QDK:
REPOS="Quantum Quantum-NC QuantumKatas QuantumLibraries iqsharp qdk-python qsharp-compiler qsharp-runtime"
for REPO in $REPOS ; do
git clone --depth 1 --single-branch --no-tags --recurse-submodules --shallow-submodules --jobs 4 \
https://github.com/microsoft/$REPO.git $SEEDS_RDPATH/$TARGET_NAME/$REPO
https://github.com/microsoft/$REPO.git $SEEDS_RDPATH/${{ matrix.target_name }}/$REPO
done

# Build a comma-separated list of all the .qs files in $SEEDS_FNAME file:
find $SEEDS_RDPATH/$TARGET_NAME -name "*.qs" | tr "\n" "," > \
$SEEDS_RDPATH/$TARGET_NAME/$SEEDS_FNAME
find $SEEDS_RDPATH/${{ matrix.target_name }} -name "*.qs" | tr "\n" "," > \
$SEEDS_RDPATH/${{ matrix.target_name }}/$SEEDS_FNAME

- name: Build and Run the Fuzz Target
run: |
cd $OWNER_RDPATH # Enter the dir containing the fuzzing infra.
cargo fuzz build --release --sanitizer=none --features do_fuzz $TARGET_NAME # Build the fuzz target.
cargo fuzz build --release --sanitizer=none --features do_fuzz ${{ matrix.target_name }} # Build the fuzz target.

# Run fuzzing for specified number of seconds and redirect the `stderr` to a file
# whose name is specified by the STDERR_LOG_FNAME env var:
RUST_BACKTRACE=1 cargo fuzz run --release --sanitizer=none --features do_fuzz $TARGET_NAME -- \
-seed_inputs=@$SEEDS_RDPATH/$TARGET_NAME/$SEEDS_FNAME \
RUST_BACKTRACE=1 cargo fuzz run --release --sanitizer=none --features do_fuzz ${{ matrix.target_name }} -- \
-seed_inputs=@$SEEDS_RDPATH/${{ matrix.target_name }}/$SEEDS_FNAME \
-max_total_time=$DURATION_SEC \
-rss_limit_mb=4096 \
-max_len=20000 \
Expand Down Expand Up @@ -116,33 +120,33 @@ jobs:
# the subsequent `run:` and `uses:` steps.

# Determine the name of a file containing the input of interest (that triggers the panic/crash):
if [ -e $ARTIFACTS_RDPATH/$TARGET_NAME/crash-* ]; then # Panic and Stack Overflow Cases.
if [ -e $ARTIFACTS_RDPATH/${{ matrix.target_name }}/crash-* ]; then # Panic and Stack Overflow Cases.
TO_MINIMIZE_FNAME=crash-*;
elif [ -e $ARTIFACTS_RDPATH/$TARGET_NAME/oom-* ]; then # Out-of-Memory Case.
elif [ -e $ARTIFACTS_RDPATH/${{ matrix.target_name }}/oom-* ]; then # Out-of-Memory Case.
TO_MINIMIZE_FNAME=oom-*;
else
echo -e "File to minimize not found.\nContents of artifacts dir \"$ARTIFACTS_RDPATH/$TARGET_NAME/\":"
ls $ARTIFACTS_RDPATH/$TARGET_NAME/
echo -e "File to minimize not found.\nContents of artifacts dir \"$ARTIFACTS_RDPATH/${{ matrix.target_name }}/\":"
ls $ARTIFACTS_RDPATH/${{ matrix.target_name }}/
fi

if [ "$TO_MINIMIZE_FNAME" != "" ]; then
echo "TO_MINIMIZE_FNAME: $TO_MINIMIZE_FNAME"

# Minimize the input:
( cargo fuzz tmin --release --sanitizer=none --features do_fuzz -r 10000 $TARGET_NAME $ARTIFACTS_RDPATH/$TARGET_NAME/$TO_MINIMIZE_FNAME 2>&1 ) > \
( cargo fuzz tmin --release --sanitizer=none --features do_fuzz -r 10000 ${{ matrix.target_name }} $ARTIFACTS_RDPATH/${{ matrix.target_name }}/$TO_MINIMIZE_FNAME 2>&1 ) > \
$TMIN_LOG_FNAME || MINIMIZATION_FAILED=1

# Get the minimized input relative faile path:
if [ "$MINIMIZATION_FAILED" == "1" ]; then
# Minimization failed, get the latest successful minimized input relative faile path:
MINIMIZED_INPUT_RFPATH=`
cat $TMIN_LOG_FNAME | grep "CRASH_MIN: minimizing crash input: " | tail -n 1 |
sed "s|^.*\($ARTIFACTS_RDPATH/$TARGET_NAME/[^\']*\).*|\1|"`
sed "s|^.*\($ARTIFACTS_RDPATH/${{ matrix.target_name }}/[^\']*\).*|\1|"`
else
# Minimization Succeeded, get the reported minimized input relative faile path::
MINIMIZED_INPUT_RFPATH=`
cat $TMIN_LOG_FNAME | grep "failed to minimize beyond" |
sed "s|.*\($ARTIFACTS_RDPATH/$TARGET_NAME/[^ ]*\).*|\1|" `
sed "s|.*\($ARTIFACTS_RDPATH/${{ matrix.target_name }}/[^ ]*\).*|\1|" `
fi
echo "MINIMIZED_INPUT_RFPATH: $MINIMIZED_INPUT_RFPATH"
echo "MINIMIZED_INPUT_RFPATH=$MINIMIZED_INPUT_RFPATH" >> "$GITHUB_ENV"
Expand Down Expand Up @@ -187,8 +191,8 @@ jobs:
path: |
${{ env.OWNER_RDPATH }}/${{ env.STDERR_LOG_FNAME }}
${{ env.OWNER_RDPATH }}/${{ env.TMIN_LOG_FNAME }}
${{ env.OWNER_RDPATH }}/${{ env.ARTIFACTS_RDPATH }}/${{ env.TARGET_NAME }}/*
${{ env.OWNER_RDPATH }}/${{ env.SEEDS_RDPATH }}/${{ env.TARGET_NAME }}/${{ env.SEEDS_FNAME }}
${{ env.OWNER_RDPATH }}/${{ env.ARTIFACTS_RDPATH }}/${{ matrix.target_name }}/*
${{ env.OWNER_RDPATH }}/${{ env.SEEDS_RDPATH }}/${{ matrix.target_name }}/${{ env.SEEDS_FNAME }}
if-no-files-found: error

- name: "If Fuzzing Failed: Report GutHub Issue"
Expand Down
6 changes: 5 additions & 1 deletion Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions compiler/qsc/src/codegen.rs
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
mod tests;

pub mod qsharp {
pub use qsc_codegen::qsharp::write_item_string;
pub use qsc_codegen::qsharp::write_package_string;
pub use qsc_codegen::qsharp::write_stmt_string;
}
Expand Down
1 change: 0 additions & 1 deletion compiler/qsc/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,6 @@ pub mod partial_eval {
}

pub mod qasm3 {
pub use qsc_qasm3::io::*;
pub use qsc_qasm3::parse::*;
pub use qsc_qasm3::*;
}
16 changes: 16 additions & 0 deletions compiler/qsc_codegen/src/qsharp.rs
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,22 @@ pub fn write_package_string(package: &Package) -> String {
format_str(&s)
}

#[must_use]
pub fn write_item_string(item: &Item) -> String {
let mut output = Vec::new();
let mut gen = QSharpGen::new(&mut output);

gen.visit_item(item);

let s = match std::str::from_utf8(&output) {
Ok(v) => v.to_owned(),
Err(e) => format!("Invalid UTF-8 sequence: {e}"),
};

output.clear();
format_str(&s)
}

#[must_use]
pub fn write_stmt_string(stmt: &ast::Stmt) -> String {
let mut output = Vec::new();
Expand Down
6 changes: 5 additions & 1 deletion compiler/qsc_qasm3/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -9,18 +9,22 @@ version.workspace = true

[dependencies]
bitflags = { workspace = true }
enum-iterator = { workspace = true }
indenter = { workspace = true }
num-bigint = { workspace = true }
num-traits = { workspace = true }
miette = { workspace = true }
qsc_ast = { path = "../qsc_ast" }
qsc_data_structures = { path = "../qsc_data_structures" }
qsc_frontend = { path = "../qsc_frontend" }
qsc_hir = { path = "../qsc_hir" }
qsc_parse = { path = "../qsc_parse" }
qsc_passes = { path = "../qsc_passes" }
rustc-hash = { workspace = true }
thiserror = { workspace = true }
oq3_source_file = { workspace = true }
oq3_syntax = { workspace = true }
oq3_parser = { workspace = true }
oq3_lexer = { workspace = true }
oq3_semantics = { workspace = true }

[dev-dependencies]
Expand Down
Loading
Loading