
The use of `NamedTempFile` in #31799 was not secure and could potentially cause write permission issues (see [this comment](https://github.com/zed-industries/zed/issues/29528#issuecomment-2939672433)). Therefore, it has been replaced with a Unix pipe. Release Notes: - N/A
322 lines
10 KiB
Rust
322 lines
10 KiB
Rust
use futures::{FutureExt, future::Shared};
|
|
use language::Buffer;
|
|
use std::{path::Path, sync::Arc};
|
|
use util::ResultExt;
|
|
use worktree::Worktree;
|
|
|
|
use collections::HashMap;
|
|
use gpui::{AppContext as _, Context, Entity, EventEmitter, Task};
|
|
use settings::Settings as _;
|
|
|
|
use crate::{
|
|
project_settings::{DirenvSettings, ProjectSettings},
|
|
worktree_store::WorktreeStore,
|
|
};
|
|
|
|
pub struct ProjectEnvironment {
|
|
cli_environment: Option<HashMap<String, String>>,
|
|
environments: HashMap<Arc<Path>, Shared<Task<Option<HashMap<String, String>>>>>,
|
|
environment_error_messages: HashMap<Arc<Path>, EnvironmentErrorMessage>,
|
|
}
|
|
|
|
pub enum ProjectEnvironmentEvent {
|
|
ErrorsUpdated,
|
|
}
|
|
|
|
impl EventEmitter<ProjectEnvironmentEvent> for ProjectEnvironment {}
|
|
|
|
impl ProjectEnvironment {
|
|
pub fn new(cli_environment: Option<HashMap<String, String>>) -> Self {
|
|
Self {
|
|
cli_environment,
|
|
environments: Default::default(),
|
|
environment_error_messages: Default::default(),
|
|
}
|
|
}
|
|
|
|
/// Returns the inherited CLI environment, if this project was opened from the Zed CLI.
|
|
pub(crate) fn get_cli_environment(&self) -> Option<HashMap<String, String>> {
|
|
if let Some(mut env) = self.cli_environment.clone() {
|
|
set_origin_marker(&mut env, EnvironmentOrigin::Cli);
|
|
Some(env)
|
|
} else {
|
|
None
|
|
}
|
|
}
|
|
|
|
/// Returns an iterator over all pairs `(abs_path, error_message)` of
|
|
/// environment errors associated with this project environment.
|
|
pub(crate) fn environment_errors(
|
|
&self,
|
|
) -> impl Iterator<Item = (&Arc<Path>, &EnvironmentErrorMessage)> {
|
|
self.environment_error_messages.iter()
|
|
}
|
|
|
|
pub(crate) fn remove_environment_error(&mut self, abs_path: &Path, cx: &mut Context<Self>) {
|
|
self.environment_error_messages.remove(abs_path);
|
|
cx.emit(ProjectEnvironmentEvent::ErrorsUpdated);
|
|
}
|
|
|
|
pub(crate) fn get_buffer_environment(
|
|
&mut self,
|
|
buffer: &Entity<Buffer>,
|
|
worktree_store: &Entity<WorktreeStore>,
|
|
cx: &mut Context<Self>,
|
|
) -> Shared<Task<Option<HashMap<String, String>>>> {
|
|
if cfg!(any(test, feature = "test-support")) {
|
|
return Task::ready(Some(HashMap::default())).shared();
|
|
}
|
|
|
|
if let Some(cli_environment) = self.get_cli_environment() {
|
|
log::debug!("using project environment variables from CLI");
|
|
return Task::ready(Some(cli_environment)).shared();
|
|
}
|
|
|
|
let Some(worktree) = buffer
|
|
.read(cx)
|
|
.file()
|
|
.map(|f| f.worktree_id(cx))
|
|
.and_then(|worktree_id| worktree_store.read(cx).worktree_for_id(worktree_id, cx))
|
|
else {
|
|
return Task::ready(None).shared();
|
|
};
|
|
|
|
self.get_worktree_environment(worktree, cx)
|
|
}
|
|
|
|
pub(crate) fn get_worktree_environment(
|
|
&mut self,
|
|
worktree: Entity<Worktree>,
|
|
cx: &mut Context<Self>,
|
|
) -> Shared<Task<Option<HashMap<String, String>>>> {
|
|
if cfg!(any(test, feature = "test-support")) {
|
|
return Task::ready(Some(HashMap::default())).shared();
|
|
}
|
|
|
|
if let Some(cli_environment) = self.get_cli_environment() {
|
|
log::debug!("using project environment variables from CLI");
|
|
return Task::ready(Some(cli_environment)).shared();
|
|
}
|
|
|
|
let mut abs_path = worktree.read(cx).abs_path();
|
|
if !worktree.read(cx).is_local() {
|
|
log::error!(
|
|
"attempted to get project environment for a non-local worktree at {abs_path:?}"
|
|
);
|
|
return Task::ready(None).shared();
|
|
} else if worktree.read(cx).is_single_file() {
|
|
let Some(parent) = abs_path.parent() else {
|
|
return Task::ready(None).shared();
|
|
};
|
|
abs_path = parent.into();
|
|
}
|
|
|
|
self.get_directory_environment(abs_path, cx)
|
|
}
|
|
|
|
/// Returns the project environment, if possible.
|
|
/// If the project was opened from the CLI, then the inherited CLI environment is returned.
|
|
/// If it wasn't opened from the CLI, and an absolute path is given, then a shell is spawned in
|
|
/// that directory, to get environment variables as if the user has `cd`'d there.
|
|
pub(crate) fn get_directory_environment(
|
|
&mut self,
|
|
abs_path: Arc<Path>,
|
|
cx: &mut Context<Self>,
|
|
) -> Shared<Task<Option<HashMap<String, String>>>> {
|
|
if cfg!(any(test, feature = "test-support")) {
|
|
return Task::ready(Some(HashMap::default())).shared();
|
|
}
|
|
|
|
if let Some(cli_environment) = self.get_cli_environment() {
|
|
log::debug!("using project environment variables from CLI");
|
|
return Task::ready(Some(cli_environment)).shared();
|
|
}
|
|
|
|
self.environments
|
|
.entry(abs_path.clone())
|
|
.or_insert_with(|| get_directory_env_impl(abs_path.clone(), cx).shared())
|
|
.clone()
|
|
}
|
|
}
|
|
|
|
fn set_origin_marker(env: &mut HashMap<String, String>, origin: EnvironmentOrigin) {
|
|
env.insert(ZED_ENVIRONMENT_ORIGIN_MARKER.to_string(), origin.into());
|
|
}
|
|
|
|
const ZED_ENVIRONMENT_ORIGIN_MARKER: &str = "ZED_ENVIRONMENT";
|
|
|
|
enum EnvironmentOrigin {
|
|
Cli,
|
|
WorktreeShell,
|
|
}
|
|
|
|
impl From<EnvironmentOrigin> for String {
|
|
fn from(val: EnvironmentOrigin) -> Self {
|
|
match val {
|
|
EnvironmentOrigin::Cli => "cli".into(),
|
|
EnvironmentOrigin::WorktreeShell => "worktree-shell".into(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub struct EnvironmentErrorMessage(pub String);
|
|
|
|
impl std::fmt::Display for EnvironmentErrorMessage {
|
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
|
write!(f, "{}", self.0)
|
|
}
|
|
}
|
|
|
|
impl EnvironmentErrorMessage {
|
|
#[allow(dead_code)]
|
|
fn from_str(s: &str) -> Self {
|
|
Self(String::from(s))
|
|
}
|
|
}
|
|
|
|
async fn load_directory_shell_environment(
|
|
abs_path: &Path,
|
|
load_direnv: &DirenvSettings,
|
|
) -> (
|
|
Option<HashMap<String, String>>,
|
|
Option<EnvironmentErrorMessage>,
|
|
) {
|
|
match smol::fs::metadata(abs_path).await {
|
|
Ok(meta) => {
|
|
let dir = if meta.is_dir() {
|
|
abs_path
|
|
} else if let Some(parent) = abs_path.parent() {
|
|
parent
|
|
} else {
|
|
return (
|
|
None,
|
|
Some(EnvironmentErrorMessage(format!(
|
|
"Failed to load shell environment in {}: not a directory",
|
|
abs_path.display()
|
|
))),
|
|
);
|
|
};
|
|
|
|
load_shell_environment(&dir, load_direnv).await
|
|
}
|
|
Err(err) => (
|
|
None,
|
|
Some(EnvironmentErrorMessage(format!(
|
|
"Failed to load shell environment in {}: {}",
|
|
abs_path.display(),
|
|
err
|
|
))),
|
|
),
|
|
}
|
|
}
|
|
|
|
#[cfg(any(test, feature = "test-support"))]
|
|
async fn load_shell_environment(
|
|
_dir: &Path,
|
|
_load_direnv: &DirenvSettings,
|
|
) -> (
|
|
Option<HashMap<String, String>>,
|
|
Option<EnvironmentErrorMessage>,
|
|
) {
|
|
let fake_env = [("ZED_FAKE_TEST_ENV".into(), "true".into())]
|
|
.into_iter()
|
|
.collect();
|
|
(Some(fake_env), None)
|
|
}
|
|
|
|
#[cfg(all(target_os = "windows", not(any(test, feature = "test-support"))))]
|
|
async fn load_shell_environment(
|
|
_dir: &Path,
|
|
_load_direnv: &DirenvSettings,
|
|
) -> (
|
|
Option<HashMap<String, String>>,
|
|
Option<EnvironmentErrorMessage>,
|
|
) {
|
|
// TODO the current code works with Unix $SHELL only, implement environment loading on windows
|
|
(None, None)
|
|
}
|
|
|
|
#[cfg(not(any(target_os = "windows", test, feature = "test-support")))]
|
|
async fn load_shell_environment(
|
|
dir: &Path,
|
|
load_direnv: &DirenvSettings,
|
|
) -> (
|
|
Option<HashMap<String, String>>,
|
|
Option<EnvironmentErrorMessage>,
|
|
) {
|
|
use crate::direnv::load_direnv_environment;
|
|
use util::shell_env;
|
|
|
|
let dir_ = dir.to_owned();
|
|
let mut envs = match smol::unblock(move || shell_env::capture(&dir_)).await {
|
|
Ok(envs) => envs,
|
|
Err(err) => {
|
|
util::log_err(&err);
|
|
return (
|
|
None,
|
|
Some(EnvironmentErrorMessage::from_str(
|
|
"Failed to load environment variables. See log for details",
|
|
)),
|
|
);
|
|
}
|
|
};
|
|
|
|
// If the user selects `Direct` for direnv, it would set an environment
|
|
// variable that later uses to know that it should not run the hook.
|
|
// We would include in `.envs` call so it is okay to run the hook
|
|
// even if direnv direct mode is enabled.
|
|
let (direnv_environment, direnv_error) = match load_direnv {
|
|
DirenvSettings::ShellHook => (None, None),
|
|
DirenvSettings::Direct => match load_direnv_environment(&envs, dir).await {
|
|
Ok(env) => (Some(env), None),
|
|
Err(err) => (None, err.into()),
|
|
},
|
|
};
|
|
if let Some(direnv_environment) = direnv_environment {
|
|
envs.extend(direnv_environment);
|
|
}
|
|
|
|
(Some(envs), direnv_error)
|
|
}
|
|
|
|
fn get_directory_env_impl(
|
|
abs_path: Arc<Path>,
|
|
cx: &Context<ProjectEnvironment>,
|
|
) -> Task<Option<HashMap<String, String>>> {
|
|
let load_direnv = ProjectSettings::get_global(cx).load_direnv.clone();
|
|
|
|
cx.spawn(async move |this, cx| {
|
|
let (mut shell_env, error_message) = cx
|
|
.background_spawn({
|
|
let abs_path = abs_path.clone();
|
|
async move { load_directory_shell_environment(&abs_path, &load_direnv).await }
|
|
})
|
|
.await;
|
|
|
|
if let Some(shell_env) = shell_env.as_mut() {
|
|
let path = shell_env
|
|
.get("PATH")
|
|
.map(|path| path.as_str())
|
|
.unwrap_or_default();
|
|
log::info!(
|
|
"using project environment variables shell launched in {:?}. PATH={:?}",
|
|
abs_path,
|
|
path
|
|
);
|
|
|
|
set_origin_marker(shell_env, EnvironmentOrigin::WorktreeShell);
|
|
}
|
|
|
|
if let Some(error) = error_message {
|
|
this.update(cx, |this, cx| {
|
|
log::error!("{error}",);
|
|
this.environment_error_messages.insert(abs_path, error);
|
|
cx.emit(ProjectEnvironmentEvent::ErrorsUpdated)
|
|
})
|
|
.log_err();
|
|
}
|
|
|
|
shell_env
|
|
})
|
|
}
|