Continuation of #8229 # Description The `ShellError` enum at the moment is kind of messy. Many variants are basic tuple structs where you always have to reference the implementation with its macro invocation to know which field serves which purpose. Furthermore we have both variants that are kind of redundant or either overly broad to be useful for the user to match on or overly specific with few uses. So I set out to start fixing the lacking documentation and naming to make it feasible to critically review the individual usages and fix those. Furthermore we can decide to join or split up variants that don't seem to be fit for purpose. **Everyone:** Feel free to add review comments if you spot inconsistent use of `ShellError` variants. - Name fields of `SE::IncorrectValue` - Merge and name fields on `SE::TypeMismatch` - Name fields on `SE::UnsupportedOperator` - Name fields on `AssignmentRequires*` and fix doc - Name fields on `SE::UnknownOperator` - Name fields on `SE::MissingParameter` - Name fields on `SE::DelimiterError` - Name fields on `SE::IncompatibleParametersSingle` # User-Facing Changes (None now, end goal more explicit and consistent error messages) # Tests + Formatting (No additional tests needed so far)
218 lines
7.3 KiB
Rust
218 lines
7.3 KiB
Rust
use nu_engine::{eval_block, CallExt};
|
|
use nu_protocol::ast::Call;
|
|
use nu_protocol::engine::{Command, EngineState, Stack};
|
|
use nu_protocol::util::BufferedReader;
|
|
use nu_protocol::{
|
|
Category, Example, PipelineData, RawStream, ShellError, Signature, Spanned, SyntaxShape, Type,
|
|
Value,
|
|
};
|
|
use std::io::BufReader;
|
|
|
|
#[cfg(feature = "sqlite")]
|
|
use crate::database::SQLiteDatabase;
|
|
|
|
#[cfg(feature = "sqlite")]
|
|
use nu_protocol::IntoPipelineData;
|
|
|
|
#[cfg(unix)]
|
|
use std::os::unix::fs::PermissionsExt;
|
|
use std::path::Path;
|
|
|
|
#[derive(Clone)]
|
|
pub struct Open;
|
|
|
|
impl Command for Open {
|
|
fn name(&self) -> &str {
|
|
"open"
|
|
}
|
|
|
|
fn usage(&self) -> &str {
|
|
"Load a file into a cell, converting to table if possible (avoid by appending '--raw')."
|
|
}
|
|
|
|
fn search_terms(&self) -> Vec<&str> {
|
|
vec!["load", "read", "load_file", "read_file"]
|
|
}
|
|
|
|
fn signature(&self) -> nu_protocol::Signature {
|
|
Signature::build("open")
|
|
.input_output_types(vec![(Type::Nothing, Type::Any), (Type::String, Type::Any)])
|
|
.optional("filename", SyntaxShape::Filepath, "the filename to use")
|
|
.switch("raw", "open file as raw binary", Some('r'))
|
|
.category(Category::FileSystem)
|
|
}
|
|
|
|
fn run(
|
|
&self,
|
|
engine_state: &EngineState,
|
|
stack: &mut Stack,
|
|
call: &Call,
|
|
input: PipelineData,
|
|
) -> Result<PipelineData, ShellError> {
|
|
let raw = call.has_flag("raw");
|
|
let call_span = call.head;
|
|
let ctrlc = engine_state.ctrlc.clone();
|
|
let path = call.opt::<Spanned<String>>(engine_state, stack, 0)?;
|
|
|
|
let path = {
|
|
if let Some(path_val) = path {
|
|
Some(Spanned {
|
|
item: nu_utils::strip_ansi_string_unlikely(path_val.item),
|
|
span: path_val.span,
|
|
})
|
|
} else {
|
|
path
|
|
}
|
|
};
|
|
|
|
let path = if let Some(path) = path {
|
|
path
|
|
} else {
|
|
// Collect a filename from the input
|
|
match input {
|
|
PipelineData::Value(Value::Nothing { .. }, ..) => {
|
|
return Err(ShellError::MissingParameter {
|
|
param_name: "needs filename".to_string(),
|
|
span: call.head,
|
|
})
|
|
}
|
|
PipelineData::Value(val, ..) => val.as_spanned_string()?,
|
|
_ => {
|
|
return Err(ShellError::MissingParameter {
|
|
param_name: "needs filename".to_string(),
|
|
span: call.head,
|
|
});
|
|
}
|
|
}
|
|
};
|
|
let arg_span = path.span;
|
|
let path_no_whitespace = &path.item.trim_end_matches(|x| matches!(x, '\x09'..='\x0d'));
|
|
let path = Path::new(path_no_whitespace);
|
|
|
|
if permission_denied(path) {
|
|
#[cfg(unix)]
|
|
let error_msg = match path.metadata() {
|
|
Ok(md) => format!(
|
|
"The permissions of {:o} does not allow access for this user",
|
|
md.permissions().mode() & 0o0777
|
|
),
|
|
Err(e) => e.to_string(),
|
|
};
|
|
|
|
#[cfg(not(unix))]
|
|
let error_msg = String::from("Permission denied");
|
|
Err(ShellError::GenericError(
|
|
"Permission denied".into(),
|
|
error_msg,
|
|
Some(arg_span),
|
|
None,
|
|
Vec::new(),
|
|
))
|
|
} else {
|
|
#[cfg(feature = "sqlite")]
|
|
if !raw {
|
|
let res = SQLiteDatabase::try_from_path(path, arg_span, ctrlc.clone())
|
|
.map(|db| db.into_value(call.head).into_pipeline_data());
|
|
|
|
if res.is_ok() {
|
|
return res;
|
|
}
|
|
}
|
|
|
|
let file = match std::fs::File::open(path) {
|
|
Ok(file) => file,
|
|
Err(err) => {
|
|
return Err(ShellError::GenericError(
|
|
"Permission denied".into(),
|
|
err.to_string(),
|
|
Some(arg_span),
|
|
None,
|
|
Vec::new(),
|
|
));
|
|
}
|
|
};
|
|
|
|
let buf_reader = BufReader::new(file);
|
|
|
|
let output = PipelineData::ExternalStream {
|
|
stdout: Some(RawStream::new(
|
|
Box::new(BufferedReader { input: buf_reader }),
|
|
ctrlc,
|
|
call_span,
|
|
None,
|
|
)),
|
|
stderr: None,
|
|
exit_code: None,
|
|
span: call_span,
|
|
metadata: None,
|
|
trim_end_newline: false,
|
|
};
|
|
|
|
let ext = if raw {
|
|
None
|
|
} else {
|
|
path.extension()
|
|
.map(|name| name.to_string_lossy().to_string())
|
|
};
|
|
|
|
if let Some(ext) = ext {
|
|
match engine_state.find_decl(format!("from {ext}").as_bytes(), &[]) {
|
|
Some(converter_id) => {
|
|
let decl = engine_state.get_decl(converter_id);
|
|
if let Some(block_id) = decl.get_block_id() {
|
|
let block = engine_state.get_block(block_id);
|
|
eval_block(engine_state, stack, block, output, false, false)
|
|
} else {
|
|
decl.run(engine_state, stack, &Call::new(call_span), output)
|
|
}
|
|
.map_err(|inner| {
|
|
ShellError::GenericError(
|
|
format!("Error while parsing as {ext}"),
|
|
format!("Could not parse '{}' with `from {}`", path.display(), ext),
|
|
Some(arg_span),
|
|
Some(format!("Check out `help from {}` or `help from` for more options or open raw data with `open --raw '{}'`", ext, path.display())),
|
|
vec![inner],
|
|
)
|
|
})
|
|
}
|
|
None => Ok(output),
|
|
}
|
|
} else {
|
|
Ok(output)
|
|
}
|
|
}
|
|
}
|
|
|
|
fn examples(&self) -> Vec<nu_protocol::Example> {
|
|
vec![
|
|
Example {
|
|
description: "Open a file, with structure (based on file extension or SQLite database header)",
|
|
example: "open myfile.json",
|
|
result: None,
|
|
},
|
|
Example {
|
|
description: "Open a file, as raw bytes",
|
|
example: "open myfile.json --raw",
|
|
result: None,
|
|
},
|
|
Example {
|
|
description: "Open a file, using the input to get filename",
|
|
example: "'myfile.txt' | open",
|
|
result: None,
|
|
},
|
|
Example {
|
|
description: "Open a file, and decode it by the specified encoding",
|
|
example: "open myfile.txt --raw | decode utf-8",
|
|
result: None,
|
|
},
|
|
]
|
|
}
|
|
}
|
|
|
|
fn permission_denied(dir: impl AsRef<Path>) -> bool {
|
|
match dir.as_ref().read_dir() {
|
|
Err(e) => matches!(e.kind(), std::io::ErrorKind::PermissionDenied),
|
|
Ok(_) => false,
|
|
}
|
|
}
|