Portability | non-portable |
---|---|
Stability | experimental |
Maintainer | Edward Kmett <ekmett@gmail.com> |
Safe Haskell | Safe-Infered |
Based on the Functional Pearl: Implicit Configurations paper by Oleg Kiselyov and Chung-chieh Shan.
http://www.cs.rutgers.edu/~ccshan/prepose/prepose.pdf
The approach from the paper was modified to work with Data.Proxy and to cheat by using knowledge of GHC's internal representations by Edward Kmett and Elliott Hird.
Usage reduces to using two combinators, reify
and reflect
.
ghci> reify 6 (\p -> reflect p + reflect p) :: Int 12
The argument passed along by reify is just a data Proxy t =
Proxy
, so all of the information needed to reconstruct your value
has been moved to the type level. This enables it to be used when
constructing instances (see examples/Monoid.hs
).