Auto merge of #140282 - matthiaskrgr:rollup-g6ze4jj, r=matthiaskrgr
Rollup of 8 pull requests Successful merges: - #137653 (Deprecate the unstable `concat_idents!`) - #138957 (Update the index of Option to make the summary more comprehensive) - #140006 (ensure compiler existance of tools on the dist step) - #140143 (Move `sys::pal::os::Env` into `sys::env`) - #140202 (Make #![feature(let_chains)] bootstrap conditional in compiler/) - #140236 (norm nested aliases before evaluating the parent goal) - #140257 (Some drive-by housecleaning in `rustc_borrowck`) - #140278 (Don't use item name to look up associated item from trait item) r? `@ghost` `@rustbot` modify labels: rollup
This commit is contained in:
commit
8f43b85954
119 changed files with 1408 additions and 1513 deletions
|
|
@ -4158,7 +4158,6 @@ dependencies = [
|
|||
"rustc_data_structures",
|
||||
"rustc_index",
|
||||
"rustc_macros",
|
||||
"rustc_serialize",
|
||||
"rustc_type_ir",
|
||||
"rustc_type_ir_macros",
|
||||
"tracing",
|
||||
|
|
|
|||
|
|
@ -6,6 +6,7 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(
|
||||
html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/",
|
||||
test(attr(deny(warnings)))
|
||||
|
|
@ -14,7 +15,6 @@
|
|||
#![feature(associated_type_defaults)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustdoc_internals)]
|
||||
|
|
|
|||
|
|
@ -32,12 +32,12 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(exact_size_is_empty)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -4,11 +4,11 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iter_is_partitioned)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -77,8 +77,8 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -49,7 +49,7 @@ impl<'tcx> UniverseInfo<'tcx> {
|
|||
UniverseInfo::RelateTys { expected, found }
|
||||
}
|
||||
|
||||
pub(crate) fn report_error(
|
||||
pub(crate) fn report_erroneous_element(
|
||||
&self,
|
||||
mbcx: &mut MirBorrowckCtxt<'_, '_, 'tcx>,
|
||||
placeholder: ty::PlaceholderRegion,
|
||||
|
|
@ -68,7 +68,7 @@ impl<'tcx> UniverseInfo<'tcx> {
|
|||
mbcx.buffer_error(err);
|
||||
}
|
||||
UniverseInfo::TypeOp(ref type_op_info) => {
|
||||
type_op_info.report_error(mbcx, placeholder, error_element, cause);
|
||||
type_op_info.report_erroneous_element(mbcx, placeholder, error_element, cause);
|
||||
}
|
||||
UniverseInfo::Other => {
|
||||
// FIXME: This error message isn't great, but it doesn't show
|
||||
|
|
@ -145,8 +145,11 @@ pub(crate) trait TypeOpInfo<'tcx> {
|
|||
error_region: Option<ty::Region<'tcx>>,
|
||||
) -> Option<Diag<'infcx>>;
|
||||
|
||||
/// Constraints require that `error_element` appear in the
|
||||
/// values of `placeholder`, but this cannot be proven to
|
||||
/// hold. Report an error.
|
||||
#[instrument(level = "debug", skip(self, mbcx))]
|
||||
fn report_error(
|
||||
fn report_erroneous_element(
|
||||
&self,
|
||||
mbcx: &mut MirBorrowckCtxt<'_, '_, 'tcx>,
|
||||
placeholder: ty::PlaceholderRegion,
|
||||
|
|
@ -190,12 +193,7 @@ pub(crate) trait TypeOpInfo<'tcx> {
|
|||
let nice_error = self.nice_error(mbcx, cause, placeholder_region, error_region);
|
||||
|
||||
debug!(?nice_error);
|
||||
|
||||
if let Some(nice_error) = nice_error {
|
||||
mbcx.buffer_error(nice_error);
|
||||
} else {
|
||||
mbcx.buffer_error(self.fallback_error(tcx, span));
|
||||
}
|
||||
mbcx.buffer_error(nice_error.unwrap_or_else(|| self.fallback_error(tcx, span)));
|
||||
}
|
||||
}
|
||||
|
||||
|
|
@ -450,7 +448,8 @@ fn try_extract_error_from_region_constraints<'a, 'tcx>(
|
|||
ty::ReVar(vid) => universe_of_region(vid),
|
||||
_ => ty::UniverseIndex::ROOT,
|
||||
};
|
||||
let matches =
|
||||
// Are the two regions the same?
|
||||
let regions_the_same =
|
||||
|a_region: Region<'tcx>, b_region: Region<'tcx>| match (a_region.kind(), b_region.kind()) {
|
||||
(RePlaceholder(a_p), RePlaceholder(b_p)) => a_p.bound == b_p.bound,
|
||||
_ => a_region == b_region,
|
||||
|
|
@ -459,7 +458,7 @@ fn try_extract_error_from_region_constraints<'a, 'tcx>(
|
|||
|constraint: &Constraint<'tcx>, cause: &SubregionOrigin<'tcx>, exact| match *constraint {
|
||||
Constraint::RegSubReg(sub, sup)
|
||||
if ((exact && sup == placeholder_region)
|
||||
|| (!exact && matches(sup, placeholder_region)))
|
||||
|| (!exact && regions_the_same(sup, placeholder_region)))
|
||||
&& sup != sub =>
|
||||
{
|
||||
Some((sub, cause.clone()))
|
||||
|
|
@ -468,23 +467,21 @@ fn try_extract_error_from_region_constraints<'a, 'tcx>(
|
|||
if (exact
|
||||
&& sup == placeholder_region
|
||||
&& !universe_of_region(vid).can_name(placeholder_universe))
|
||||
|| (!exact && matches(sup, placeholder_region)) =>
|
||||
|| (!exact && regions_the_same(sup, placeholder_region)) =>
|
||||
{
|
||||
Some((ty::Region::new_var(infcx.tcx, vid), cause.clone()))
|
||||
}
|
||||
_ => None,
|
||||
};
|
||||
let mut info = region_constraints
|
||||
.constraints
|
||||
.iter()
|
||||
.find_map(|(constraint, cause)| check(constraint, cause, true));
|
||||
if info.is_none() {
|
||||
info = region_constraints
|
||||
|
||||
let mut find_culprit = |exact_match: bool| {
|
||||
region_constraints
|
||||
.constraints
|
||||
.iter()
|
||||
.find_map(|(constraint, cause)| check(constraint, cause, false));
|
||||
}
|
||||
let (sub_region, cause) = info?;
|
||||
.find_map(|(constraint, cause)| check(constraint, cause, exact_match))
|
||||
};
|
||||
|
||||
let (sub_region, cause) = find_culprit(true).or_else(|| find_culprit(false))?;
|
||||
|
||||
debug!(?sub_region, "cause = {:#?}", cause);
|
||||
let error = match (error_region, sub_region.kind()) {
|
||||
|
|
|
|||
|
|
@ -405,7 +405,7 @@ impl<'infcx, 'tcx> MirBorrowckCtxt<'_, 'infcx, 'tcx> {
|
|||
let universe = placeholder.universe;
|
||||
let universe_info = self.regioncx.universe_info(universe);
|
||||
|
||||
universe_info.report_error(self, placeholder, error_element, cause);
|
||||
universe_info.report_erroneous_element(self, placeholder, error_element, cause);
|
||||
}
|
||||
|
||||
RegionErrorKind::RegionError { fr_origin, longer_fr, shorter_fr, is_reported } => {
|
||||
|
|
|
|||
|
|
@ -2,12 +2,12 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(file_buffered)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustc_attrs)]
|
||||
|
|
|
|||
|
|
@ -1628,30 +1628,23 @@ impl<'tcx> RegionInferenceContext<'tcx> {
|
|||
let longer_fr_scc = self.constraint_sccs.scc(longer_fr);
|
||||
debug!("check_bound_universal_region: longer_fr_scc={:?}", longer_fr_scc,);
|
||||
|
||||
for error_element in self.scc_values.elements_contained_in(longer_fr_scc) {
|
||||
match error_element {
|
||||
RegionElement::Location(_) | RegionElement::RootUniversalRegion(_) => {}
|
||||
// If we have some bound universal region `'a`, then the only
|
||||
// elements it can contain is itself -- we don't know anything
|
||||
// else about it!
|
||||
RegionElement::PlaceholderRegion(placeholder1) => {
|
||||
if placeholder == placeholder1 {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// If we have some bound universal region `'a`, then the only
|
||||
// elements it can contain is itself -- we don't know anything
|
||||
// else about it!
|
||||
if let Some(error_element) = self
|
||||
.scc_values
|
||||
.elements_contained_in(longer_fr_scc)
|
||||
.find(|e| *e != RegionElement::PlaceholderRegion(placeholder))
|
||||
{
|
||||
// Stop after the first error, it gets too noisy otherwise, and does not provide more information.
|
||||
errors_buffer.push(RegionErrorKind::BoundUniversalRegionError {
|
||||
longer_fr,
|
||||
error_element,
|
||||
placeholder,
|
||||
});
|
||||
|
||||
// Stop after the first error, it gets too noisy otherwise, and does not provide more
|
||||
// information.
|
||||
break;
|
||||
} else {
|
||||
debug!("check_bound_universal_region: all bounds satisfied");
|
||||
}
|
||||
debug!("check_bound_universal_region: all bounds satisfied");
|
||||
}
|
||||
|
||||
#[instrument(level = "debug", skip(self, infcx, errors_buffer))]
|
||||
|
|
@ -2071,7 +2064,7 @@ impl<'tcx> RegionInferenceContext<'tcx> {
|
|||
constraint.category
|
||||
};
|
||||
|
||||
match category {
|
||||
let interest = match category {
|
||||
// Returns usually provide a type to blame and have specially written diagnostics,
|
||||
// so prioritize them.
|
||||
ConstraintCategory::Return(_) => 0,
|
||||
|
|
@ -2123,9 +2116,13 @@ impl<'tcx> RegionInferenceContext<'tcx> {
|
|||
// specific, and are not used for relations that would make sense to blame.
|
||||
ConstraintCategory::BoringNoLocation => 6,
|
||||
// Do not blame internal constraints.
|
||||
ConstraintCategory::Internal => 7,
|
||||
ConstraintCategory::IllegalUniverse => 8,
|
||||
}
|
||||
ConstraintCategory::IllegalUniverse => 7,
|
||||
ConstraintCategory::Internal => 8,
|
||||
};
|
||||
|
||||
debug!("constraint {constraint:?} category: {category:?}, interest: {interest:?}");
|
||||
|
||||
interest
|
||||
};
|
||||
|
||||
let best_choice = if blame_source {
|
||||
|
|
|
|||
|
|
@ -21,7 +21,7 @@ rustc_index::newtype_index! {
|
|||
|
||||
/// An individual element in a region value -- the value of a
|
||||
/// particular region variable consists of a set of these elements.
|
||||
#[derive(Debug, Clone)]
|
||||
#[derive(Debug, Clone, PartialEq)]
|
||||
pub(crate) enum RegionElement {
|
||||
/// A point in the control-flow graph.
|
||||
Location(Location),
|
||||
|
|
|
|||
|
|
@ -5,6 +5,7 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
|
|
@ -12,7 +13,6 @@
|
|||
#![feature(box_patterns)]
|
||||
#![feature(decl_macro)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(proc_macro_internals)]
|
||||
#![feature(proc_macro_quote)]
|
||||
#![feature(rustdoc_internals)]
|
||||
|
|
|
|||
|
|
@ -6,6 +6,7 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
|
|
@ -15,7 +16,6 @@
|
|||
#![feature(if_let_guard)]
|
||||
#![feature(impl_trait_in_assoc_type)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(slice_as_array)]
|
||||
#![feature(try_blocks)]
|
||||
|
|
|
|||
|
|
@ -2,13 +2,13 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(file_buffered)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(string_from_utf8_lossy_owned)]
|
||||
|
|
|
|||
|
|
@ -1,12 +1,12 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(decl_macro)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(slice_ptr_get)]
|
||||
|
|
|
|||
|
|
@ -39,8 +39,15 @@ impls_dyn_send_neg!(
|
|||
[std::io::StderrLock<'_>]
|
||||
);
|
||||
|
||||
#[cfg(any(unix, target_os = "hermit", target_os = "wasi", target_os = "solid_asp3"))]
|
||||
// Consistent with `std`, `os_imp::Env` is `!Sync` in these platforms
|
||||
#[cfg(any(
|
||||
unix,
|
||||
target_os = "hermit",
|
||||
all(target_vendor = "fortanix", target_env = "sgx"),
|
||||
target_os = "solid_asp3",
|
||||
target_os = "wasi",
|
||||
target_os = "xous"
|
||||
))]
|
||||
// Consistent with `std`, `env_imp::Env` is `!Sync` in these platforms
|
||||
impl !DynSend for std::env::VarsOs {}
|
||||
|
||||
macro_rules! already_send {
|
||||
|
|
@ -106,8 +113,15 @@ impls_dyn_sync_neg!(
|
|||
[std::sync::mpsc::Sender<T> where T]
|
||||
);
|
||||
|
||||
#[cfg(any(unix, target_os = "hermit", target_os = "wasi", target_os = "solid_asp3"))]
|
||||
// Consistent with `std`, `os_imp::Env` is `!Sync` in these platforms
|
||||
#[cfg(any(
|
||||
unix,
|
||||
target_os = "hermit",
|
||||
all(target_vendor = "fortanix", target_env = "sgx"),
|
||||
target_os = "solid_asp3",
|
||||
target_os = "wasi",
|
||||
target_os = "xous"
|
||||
))]
|
||||
// Consistent with `std`, `env_imp::Env` is `!Sync` in these platforms
|
||||
impl !DynSync for std::env::VarsOs {}
|
||||
|
||||
macro_rules! already_sync {
|
||||
|
|
|
|||
|
|
@ -7,10 +7,10 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![allow(rustc::untranslatable_diagnostic)] // FIXME: make this translatable
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(decl_macro)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(panic_backtrace_config)]
|
||||
#![feature(panic_update_hook)]
|
||||
#![feature(result_flattening)]
|
||||
|
|
|
|||
|
|
@ -7,6 +7,7 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(array_windows)]
|
||||
|
|
@ -17,7 +18,6 @@
|
|||
#![feature(default_field_values)]
|
||||
#![feature(error_reporter)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustc_attrs)]
|
||||
|
|
|
|||
|
|
@ -1,11 +1,11 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(array_windows)]
|
||||
#![feature(associated_type_defaults)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(macro_metavar_expr)]
|
||||
#![feature(map_try_insert)]
|
||||
#![feature(proc_macro_diagnostic)]
|
||||
|
|
|
|||
|
|
@ -4,12 +4,12 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(associated_type_defaults)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(closure_track_caller)]
|
||||
#![feature(debug_closure_helpers)]
|
||||
#![feature(exhaustive_patterns)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustc_attrs)]
|
||||
|
|
|
|||
|
|
@ -59,6 +59,7 @@ This API is completely unstable and subject to change.
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
|
|
@ -67,7 +68,6 @@ This API is completely unstable and subject to change.
|
|||
#![feature(if_let_guard)]
|
||||
#![feature(iter_from_coroutine)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(slice_partition_dedup)]
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//! the definitions in this file have equivalents in `rustc_ast_pretty`.
|
||||
|
||||
// tidy-alphabetical-start
|
||||
#![feature(let_chains)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![recursion_limit = "256"]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -1,11 +1,11 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(array_windows)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(try_blocks)]
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -16,12 +16,12 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(extend_one)]
|
||||
#![feature(iterator_try_collect)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![recursion_limit = "512"] // For rustdoc
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -1,8 +1,8 @@
|
|||
// tidy-alphabetical-start
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(decl_macro)]
|
||||
#![feature(file_buffered)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(try_blocks)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -21,6 +21,7 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(array_windows)]
|
||||
|
|
@ -28,7 +29,6 @@
|
|||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iter_order_by)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustc_attrs)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(try_blocks)]
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(rustc::default_hash_types)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(proc_macro_diagnostic)]
|
||||
#![feature(proc_macro_span)]
|
||||
|
|
|
|||
|
|
@ -1,5 +1,6 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(coroutines)]
|
||||
|
|
@ -8,7 +9,6 @@
|
|||
#![feature(file_buffered)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iter_from_coroutine)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(macro_metavar_expr)]
|
||||
#![feature(min_specialization)]
|
||||
#![feature(never_type)]
|
||||
|
|
|
|||
|
|
@ -29,6 +29,7 @@
|
|||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::potential_query_instability)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(allocator_api)]
|
||||
|
|
@ -48,7 +49,6 @@
|
|||
#![feature(if_let_guard)]
|
||||
#![feature(intra_doc_pointers)]
|
||||
#![feature(iter_from_coroutine)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(min_specialization)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(never_type)]
|
||||
|
|
|
|||
|
|
@ -121,11 +121,10 @@ impl<'tcx> Predicate<'tcx> {
|
|||
/// unsoundly accept some programs. See #91068.
|
||||
#[inline]
|
||||
pub fn allow_normalization(self) -> bool {
|
||||
// Keep this in sync with the one in `rustc_type_ir::inherent`!
|
||||
match self.kind().skip_binder() {
|
||||
PredicateKind::Clause(ClauseKind::WellFormed(_))
|
||||
| PredicateKind::AliasRelate(..)
|
||||
| PredicateKind::NormalizesTo(..) => false,
|
||||
PredicateKind::Clause(ClauseKind::WellFormed(_)) | PredicateKind::AliasRelate(..) => {
|
||||
false
|
||||
}
|
||||
PredicateKind::Clause(ClauseKind::Trait(_))
|
||||
| PredicateKind::Clause(ClauseKind::HostEffect(..))
|
||||
| PredicateKind::Clause(ClauseKind::RegionOutlives(_))
|
||||
|
|
@ -137,6 +136,7 @@ impl<'tcx> Predicate<'tcx> {
|
|||
| PredicateKind::Coerce(_)
|
||||
| PredicateKind::Clause(ClauseKind::ConstEvaluatable(_))
|
||||
| PredicateKind::ConstEquate(_, _)
|
||||
| PredicateKind::NormalizesTo(..)
|
||||
| PredicateKind::Ambiguous => true,
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -3,10 +3,10 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(try_blocks)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -1,10 +1,10 @@
|
|||
// tidy-alphabetical-start
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(associated_type_defaults)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(exact_size_is_empty)]
|
||||
#![feature(file_buffered)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(try_blocks)]
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -1,4 +1,5 @@
|
|||
// tidy-alphabetical-start
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(array_windows)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
|
|
@ -7,7 +8,6 @@
|
|||
#![feature(file_buffered)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(impl_trait_in_assoc_type)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(map_try_insert)]
|
||||
#![feature(never_type)]
|
||||
#![feature(try_blocks)]
|
||||
|
|
|
|||
|
|
@ -1,9 +1,9 @@
|
|||
// tidy-alphabetical-start
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(array_windows)]
|
||||
#![feature(file_buffered)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(impl_trait_in_assoc_type)]
|
||||
#![feature(let_chains)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
use rustc_hir::lang_items::LangItem;
|
||||
|
|
|
|||
|
|
@ -9,7 +9,6 @@ derive-where = "1.2.7"
|
|||
rustc_data_structures = { path = "../rustc_data_structures", optional = true }
|
||||
rustc_index = { path = "../rustc_index", default-features = false }
|
||||
rustc_macros = { path = "../rustc_macros", optional = true }
|
||||
rustc_serialize = { path = "../rustc_serialize", optional = true }
|
||||
rustc_type_ir = { path = "../rustc_type_ir", default-features = false }
|
||||
rustc_type_ir_macros = { path = "../rustc_type_ir_macros" }
|
||||
tracing = "0.1"
|
||||
|
|
@ -20,7 +19,6 @@ default = ["nightly"]
|
|||
nightly = [
|
||||
"dep:rustc_data_structures",
|
||||
"dep:rustc_macros",
|
||||
"dep:rustc_serialize",
|
||||
"rustc_index/nightly",
|
||||
"rustc_type_ir/nightly",
|
||||
]
|
||||
|
|
|
|||
|
|
@ -16,6 +16,7 @@
|
|||
//! relate them structurally.
|
||||
|
||||
use rustc_type_ir::inherent::*;
|
||||
use rustc_type_ir::solve::GoalSource;
|
||||
use rustc_type_ir::{self as ty, Interner};
|
||||
use tracing::{instrument, trace};
|
||||
|
||||
|
|
@ -49,7 +50,10 @@ where
|
|||
// Structurally normalize the lhs.
|
||||
let lhs = if let Some(alias) = lhs.to_alias_term() {
|
||||
let term = self.next_term_infer_of_kind(lhs);
|
||||
self.add_normalizes_to_goal(goal.with(cx, ty::NormalizesTo { alias, term }));
|
||||
self.add_goal(
|
||||
GoalSource::TypeRelating,
|
||||
goal.with(cx, ty::NormalizesTo { alias, term }),
|
||||
);
|
||||
term
|
||||
} else {
|
||||
lhs
|
||||
|
|
@ -58,7 +62,10 @@ where
|
|||
// Structurally normalize the rhs.
|
||||
let rhs = if let Some(alias) = rhs.to_alias_term() {
|
||||
let term = self.next_term_infer_of_kind(rhs);
|
||||
self.add_normalizes_to_goal(goal.with(cx, ty::NormalizesTo { alias, term }));
|
||||
self.add_goal(
|
||||
GoalSource::TypeRelating,
|
||||
goal.with(cx, ty::NormalizesTo { alias, term }),
|
||||
);
|
||||
term
|
||||
} else {
|
||||
rhs
|
||||
|
|
|
|||
|
|
@ -22,7 +22,7 @@ use tracing::{debug, instrument, trace};
|
|||
use crate::canonicalizer::Canonicalizer;
|
||||
use crate::delegate::SolverDelegate;
|
||||
use crate::resolve::EagerResolver;
|
||||
use crate::solve::eval_ctxt::{CurrentGoalKind, NestedGoals};
|
||||
use crate::solve::eval_ctxt::CurrentGoalKind;
|
||||
use crate::solve::{
|
||||
CanonicalInput, CanonicalResponse, Certainty, EvalCtxt, ExternalConstraintsData, Goal,
|
||||
MaybeCause, NestedNormalizationGoals, NoSolution, PredefinedOpaquesData, QueryInput,
|
||||
|
|
@ -112,13 +112,9 @@ where
|
|||
// by `try_evaluate_added_goals()`.
|
||||
let (certainty, normalization_nested_goals) = match self.current_goal_kind {
|
||||
CurrentGoalKind::NormalizesTo => {
|
||||
let NestedGoals { normalizes_to_goals, goals } =
|
||||
std::mem::take(&mut self.nested_goals);
|
||||
if cfg!(debug_assertions) {
|
||||
assert!(normalizes_to_goals.is_empty());
|
||||
if goals.is_empty() {
|
||||
assert!(matches!(goals_certainty, Certainty::Yes));
|
||||
}
|
||||
let goals = std::mem::take(&mut self.nested_goals);
|
||||
if goals.is_empty() {
|
||||
assert!(matches!(goals_certainty, Certainty::Yes));
|
||||
}
|
||||
(certainty, NestedNormalizationGoals(goals))
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,8 +1,8 @@
|
|||
use std::mem;
|
||||
use std::ops::ControlFlow;
|
||||
|
||||
use derive_where::derive_where;
|
||||
#[cfg(feature = "nightly")]
|
||||
use rustc_macros::{Decodable_NoContext, Encodable_NoContext, HashStable_NoContext};
|
||||
use rustc_macros::HashStable_NoContext;
|
||||
use rustc_type_ir::data_structures::{HashMap, HashSet, ensure_sufficient_stack};
|
||||
use rustc_type_ir::fast_reject::DeepRejectCtxt;
|
||||
use rustc_type_ir::inherent::*;
|
||||
|
|
@ -14,7 +14,6 @@ use rustc_type_ir::{
|
|||
TypeSuperFoldable, TypeSuperVisitable, TypeVisitable, TypeVisitableExt, TypeVisitor,
|
||||
TypingMode,
|
||||
};
|
||||
use rustc_type_ir_macros::{Lift_Generic, TypeFoldable_Generic, TypeVisitable_Generic};
|
||||
use tracing::{instrument, trace};
|
||||
|
||||
use crate::coherence;
|
||||
|
|
@ -114,7 +113,7 @@ where
|
|||
|
||||
pub(super) search_graph: &'a mut SearchGraph<D>,
|
||||
|
||||
nested_goals: NestedGoals<I>,
|
||||
nested_goals: Vec<(GoalSource, Goal<I, I::Predicate>)>,
|
||||
|
||||
pub(super) origin_span: I::Span,
|
||||
|
||||
|
|
@ -129,38 +128,6 @@ where
|
|||
pub(super) inspect: ProofTreeBuilder<D>,
|
||||
}
|
||||
|
||||
#[derive_where(Clone, Debug, Default; I: Interner)]
|
||||
#[derive(TypeVisitable_Generic, TypeFoldable_Generic, Lift_Generic)]
|
||||
#[cfg_attr(
|
||||
feature = "nightly",
|
||||
derive(Decodable_NoContext, Encodable_NoContext, HashStable_NoContext)
|
||||
)]
|
||||
struct NestedGoals<I: Interner> {
|
||||
/// These normalizes-to goals are treated specially during the evaluation
|
||||
/// loop. In each iteration we take the RHS of the projection, replace it with
|
||||
/// a fresh inference variable, and only after evaluating that goal do we
|
||||
/// equate the fresh inference variable with the actual RHS of the predicate.
|
||||
///
|
||||
/// This is both to improve caching, and to avoid using the RHS of the
|
||||
/// projection predicate to influence the normalizes-to candidate we select.
|
||||
///
|
||||
/// Forgetting to replace the RHS with a fresh inference variable when we evaluate
|
||||
/// this goal results in an ICE..
|
||||
pub normalizes_to_goals: Vec<Goal<I, ty::NormalizesTo<I>>>,
|
||||
/// The rest of the goals which have not yet processed or remain ambiguous.
|
||||
pub goals: Vec<(GoalSource, Goal<I, I::Predicate>)>,
|
||||
}
|
||||
|
||||
impl<I: Interner> NestedGoals<I> {
|
||||
fn new() -> Self {
|
||||
Self { normalizes_to_goals: Vec::new(), goals: Vec::new() }
|
||||
}
|
||||
|
||||
fn is_empty(&self) -> bool {
|
||||
self.normalizes_to_goals.is_empty() && self.goals.is_empty()
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(PartialEq, Eq, Debug, Hash, Clone, Copy)]
|
||||
#[cfg_attr(feature = "nightly", derive(HashStable_NoContext))]
|
||||
pub enum GenerateProofTree {
|
||||
|
|
@ -332,7 +299,7 @@ where
|
|||
let mut ecx = EvalCtxt {
|
||||
delegate,
|
||||
search_graph: &mut search_graph,
|
||||
nested_goals: NestedGoals::new(),
|
||||
nested_goals: Default::default(),
|
||||
inspect: ProofTreeBuilder::new_maybe_root(generate_proof_tree),
|
||||
|
||||
// Only relevant when canonicalizing the response,
|
||||
|
|
@ -385,7 +352,7 @@ where
|
|||
predefined_opaques_in_body: input.predefined_opaques_in_body,
|
||||
max_input_universe: canonical_input.canonical.max_universe,
|
||||
search_graph,
|
||||
nested_goals: NestedGoals::new(),
|
||||
nested_goals: Default::default(),
|
||||
origin_span: I::Span::dummy(),
|
||||
tainted: Ok(()),
|
||||
inspect: canonical_goal_evaluation.new_goal_evaluation_step(var_values),
|
||||
|
|
@ -629,78 +596,83 @@ where
|
|||
/// Goals for the next step get directly added to the nested goals of the `EvalCtxt`.
|
||||
fn evaluate_added_goals_step(&mut self) -> Result<Option<Certainty>, NoSolution> {
|
||||
let cx = self.cx();
|
||||
let mut goals = core::mem::take(&mut self.nested_goals);
|
||||
|
||||
// If this loop did not result in any progress, what's our final certainty.
|
||||
let mut unchanged_certainty = Some(Certainty::Yes);
|
||||
for goal in goals.normalizes_to_goals {
|
||||
// Replace the goal with an unconstrained infer var, so the
|
||||
// RHS does not affect projection candidate assembly.
|
||||
let unconstrained_rhs = self.next_term_infer_of_kind(goal.predicate.term);
|
||||
let unconstrained_goal = goal.with(
|
||||
cx,
|
||||
ty::NormalizesTo { alias: goal.predicate.alias, term: unconstrained_rhs },
|
||||
);
|
||||
|
||||
let (NestedNormalizationGoals(nested_goals), _, certainty) = self.evaluate_goal_raw(
|
||||
GoalEvaluationKind::Nested,
|
||||
GoalSource::TypeRelating,
|
||||
unconstrained_goal,
|
||||
)?;
|
||||
// Add the nested goals from normalization to our own nested goals.
|
||||
trace!(?nested_goals);
|
||||
goals.goals.extend(nested_goals);
|
||||
|
||||
// Finally, equate the goal's RHS with the unconstrained var.
|
||||
for (source, goal) in mem::take(&mut self.nested_goals) {
|
||||
// We treat normalizes-to goals specially here. In each iteration we take the
|
||||
// RHS of the projection, replace it with a fresh inference variable, and only
|
||||
// after evaluating that goal do we equate the fresh inference variable with the
|
||||
// actual RHS of the predicate.
|
||||
//
|
||||
// SUBTLE:
|
||||
// We structurally relate aliases here. This is necessary
|
||||
// as we otherwise emit a nested `AliasRelate` goal in case the
|
||||
// returned term is a rigid alias, resulting in overflow.
|
||||
// This is both to improve caching, and to avoid using the RHS of the
|
||||
// projection predicate to influence the normalizes-to candidate we select.
|
||||
//
|
||||
// It is correct as both `goal.predicate.term` and `unconstrained_rhs`
|
||||
// start out as an unconstrained inference variable so any aliases get
|
||||
// fully normalized when instantiating it.
|
||||
//
|
||||
// FIXME: Strictly speaking this may be incomplete if the normalized-to
|
||||
// type contains an ambiguous alias referencing bound regions. We should
|
||||
// consider changing this to only use "shallow structural equality".
|
||||
self.eq_structurally_relating_aliases(
|
||||
goal.param_env,
|
||||
goal.predicate.term,
|
||||
unconstrained_rhs,
|
||||
)?;
|
||||
// Forgetting to replace the RHS with a fresh inference variable when we evaluate
|
||||
// this goal results in an ICE.
|
||||
if let Some(pred) = goal.predicate.as_normalizes_to() {
|
||||
// We should never encounter higher-ranked normalizes-to goals.
|
||||
let pred = pred.no_bound_vars().unwrap();
|
||||
// Replace the goal with an unconstrained infer var, so the
|
||||
// RHS does not affect projection candidate assembly.
|
||||
let unconstrained_rhs = self.next_term_infer_of_kind(pred.term);
|
||||
let unconstrained_goal =
|
||||
goal.with(cx, ty::NormalizesTo { alias: pred.alias, term: unconstrained_rhs });
|
||||
|
||||
// We only look at the `projection_ty` part here rather than
|
||||
// looking at the "has changed" return from evaluate_goal,
|
||||
// because we expect the `unconstrained_rhs` part of the predicate
|
||||
// to have changed -- that means we actually normalized successfully!
|
||||
let with_resolved_vars = self.resolve_vars_if_possible(goal);
|
||||
if goal.predicate.alias != with_resolved_vars.predicate.alias {
|
||||
unchanged_certainty = None;
|
||||
}
|
||||
let (NestedNormalizationGoals(nested_goals), _, certainty) =
|
||||
self.evaluate_goal_raw(GoalEvaluationKind::Nested, source, unconstrained_goal)?;
|
||||
// Add the nested goals from normalization to our own nested goals.
|
||||
trace!(?nested_goals);
|
||||
self.nested_goals.extend(nested_goals);
|
||||
|
||||
match certainty {
|
||||
Certainty::Yes => {}
|
||||
Certainty::Maybe(_) => {
|
||||
self.nested_goals.normalizes_to_goals.push(with_resolved_vars);
|
||||
unchanged_certainty = unchanged_certainty.map(|c| c.unify_with(certainty));
|
||||
// Finally, equate the goal's RHS with the unconstrained var.
|
||||
//
|
||||
// SUBTLE:
|
||||
// We structurally relate aliases here. This is necessary
|
||||
// as we otherwise emit a nested `AliasRelate` goal in case the
|
||||
// returned term is a rigid alias, resulting in overflow.
|
||||
//
|
||||
// It is correct as both `goal.predicate.term` and `unconstrained_rhs`
|
||||
// start out as an unconstrained inference variable so any aliases get
|
||||
// fully normalized when instantiating it.
|
||||
//
|
||||
// FIXME: Strictly speaking this may be incomplete if the normalized-to
|
||||
// type contains an ambiguous alias referencing bound regions. We should
|
||||
// consider changing this to only use "shallow structural equality".
|
||||
self.eq_structurally_relating_aliases(
|
||||
goal.param_env,
|
||||
pred.term,
|
||||
unconstrained_rhs,
|
||||
)?;
|
||||
|
||||
// We only look at the `projection_ty` part here rather than
|
||||
// looking at the "has changed" return from evaluate_goal,
|
||||
// because we expect the `unconstrained_rhs` part of the predicate
|
||||
// to have changed -- that means we actually normalized successfully!
|
||||
let with_resolved_vars = self.resolve_vars_if_possible(goal);
|
||||
if pred.alias != goal.predicate.as_normalizes_to().unwrap().skip_binder().alias {
|
||||
unchanged_certainty = None;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
for (source, goal) in goals.goals {
|
||||
let (has_changed, certainty) =
|
||||
self.evaluate_goal(GoalEvaluationKind::Nested, source, goal)?;
|
||||
if has_changed == HasChanged::Yes {
|
||||
unchanged_certainty = None;
|
||||
}
|
||||
match certainty {
|
||||
Certainty::Yes => {}
|
||||
Certainty::Maybe(_) => {
|
||||
self.nested_goals.push((source, with_resolved_vars));
|
||||
unchanged_certainty = unchanged_certainty.map(|c| c.unify_with(certainty));
|
||||
}
|
||||
}
|
||||
} else {
|
||||
let (has_changed, certainty) =
|
||||
self.evaluate_goal(GoalEvaluationKind::Nested, source, goal)?;
|
||||
if has_changed == HasChanged::Yes {
|
||||
unchanged_certainty = None;
|
||||
}
|
||||
|
||||
match certainty {
|
||||
Certainty::Yes => {}
|
||||
Certainty::Maybe(_) => {
|
||||
self.nested_goals.goals.push((source, goal));
|
||||
unchanged_certainty = unchanged_certainty.map(|c| c.unify_with(certainty));
|
||||
match certainty {
|
||||
Certainty::Yes => {}
|
||||
Certainty::Maybe(_) => {
|
||||
self.nested_goals.push((source, goal));
|
||||
unchanged_certainty = unchanged_certainty.map(|c| c.unify_with(certainty));
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -717,23 +689,12 @@ where
|
|||
self.delegate.cx()
|
||||
}
|
||||
|
||||
#[instrument(level = "trace", skip(self))]
|
||||
pub(super) fn add_normalizes_to_goal(&mut self, mut goal: Goal<I, ty::NormalizesTo<I>>) {
|
||||
goal.predicate = goal.predicate.fold_with(&mut ReplaceAliasWithInfer::new(
|
||||
self,
|
||||
GoalSource::TypeRelating,
|
||||
goal.param_env,
|
||||
));
|
||||
self.inspect.add_normalizes_to_goal(self.delegate, self.max_input_universe, goal);
|
||||
self.nested_goals.normalizes_to_goals.push(goal);
|
||||
}
|
||||
|
||||
#[instrument(level = "debug", skip(self))]
|
||||
pub(super) fn add_goal(&mut self, source: GoalSource, mut goal: Goal<I, I::Predicate>) {
|
||||
goal.predicate =
|
||||
goal.predicate.fold_with(&mut ReplaceAliasWithInfer::new(self, source, goal.param_env));
|
||||
self.inspect.add_goal(self.delegate, self.max_input_universe, source, goal);
|
||||
self.nested_goals.goals.push((source, goal));
|
||||
self.nested_goals.push((source, goal));
|
||||
}
|
||||
|
||||
#[instrument(level = "trace", skip(self, goals))]
|
||||
|
|
|
|||
|
|
@ -412,20 +412,6 @@ impl<D: SolverDelegate<Interner = I>, I: Interner> ProofTreeBuilder<D> {
|
|||
}
|
||||
}
|
||||
|
||||
pub(crate) fn add_normalizes_to_goal(
|
||||
&mut self,
|
||||
delegate: &D,
|
||||
max_input_universe: ty::UniverseIndex,
|
||||
goal: Goal<I, ty::NormalizesTo<I>>,
|
||||
) {
|
||||
self.add_goal(
|
||||
delegate,
|
||||
max_input_universe,
|
||||
GoalSource::TypeRelating,
|
||||
goal.with(delegate.cx(), goal.predicate),
|
||||
);
|
||||
}
|
||||
|
||||
pub(crate) fn add_goal(
|
||||
&mut self,
|
||||
delegate: &D,
|
||||
|
|
|
|||
|
|
@ -4,13 +4,13 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(array_windows)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(debug_closure_helpers)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(string_from_utf8_lossy_owned)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -6,9 +6,9 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(map_try_insert)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(try_blocks)]
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@
|
|||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![allow(unused_crate_dependencies)]
|
||||
#![cfg_attr(feature = "rustc", feature(let_chains))]
|
||||
#![cfg_attr(all(feature = "rustc", bootstrap), feature(let_chains))]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
pub mod constructor;
|
||||
|
|
|
|||
|
|
@ -1,9 +1,9 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(associated_type_defaults)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(try_blocks)]
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -1,9 +1,9 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(rustc::potential_query_instability, internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(core_intrinsics)]
|
||||
#![feature(dropck_eyepatch)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(min_specialization)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -10,13 +10,13 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustc_attrs)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
//! compiler.
|
||||
|
||||
// tidy-alphabetical-start
|
||||
#![feature(let_chains)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
pub mod cfi;
|
||||
|
|
|
|||
|
|
@ -1,8 +1,8 @@
|
|||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![feature(default_field_values)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustc_attrs)]
|
||||
// To generate CodegenOptionsTargetModifiers and UnstableOptionsTargetModifiers enums
|
||||
// with macro_rules, it is necessary to use recursive mechanic ("Incremental TT Munchers").
|
||||
|
|
|
|||
|
|
@ -17,6 +17,7 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(array_windows)]
|
||||
|
|
@ -24,7 +25,6 @@
|
|||
#![feature(core_io_borrowed_buf)]
|
||||
#![feature(hash_set_entry)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(map_try_insert)]
|
||||
#![feature(negative_impls)]
|
||||
#![feature(read_buf)]
|
||||
|
|
|
|||
|
|
@ -89,9 +89,9 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
||||
|
|
|
|||
|
|
@ -9,12 +9,12 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
#![feature(debug_closure_helpers)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(rustc_attrs)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -1523,19 +1523,17 @@ impl<'a, 'tcx> TypeErrCtxt<'a, 'tcx> {
|
|||
return None;
|
||||
};
|
||||
|
||||
let trait_assoc_item = self.tcx.opt_associated_item(proj.projection_term.def_id)?;
|
||||
let trait_assoc_ident = trait_assoc_item.ident(self.tcx);
|
||||
|
||||
let mut associated_items = vec![];
|
||||
self.tcx.for_each_relevant_impl(
|
||||
self.tcx.trait_of_item(proj.projection_term.def_id)?,
|
||||
proj.projection_term.self_ty(),
|
||||
|impl_def_id| {
|
||||
associated_items.extend(
|
||||
self.tcx
|
||||
.associated_items(impl_def_id)
|
||||
.in_definition_order()
|
||||
.find(|assoc| assoc.ident(self.tcx) == trait_assoc_ident),
|
||||
self.tcx.associated_items(impl_def_id).in_definition_order().find(
|
||||
|assoc| {
|
||||
assoc.trait_item_def_id == Some(proj.projection_term.def_id)
|
||||
},
|
||||
),
|
||||
);
|
||||
},
|
||||
);
|
||||
|
|
|
|||
|
|
@ -14,6 +14,7 @@
|
|||
#![allow(internal_features)]
|
||||
#![allow(rustc::diagnostic_outside_of_impl)]
|
||||
#![allow(rustc::untranslatable_diagnostic)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
|
|
@ -23,7 +24,6 @@
|
|||
#![feature(if_let_guard)]
|
||||
#![feature(iter_intersperse)]
|
||||
#![feature(iterator_try_reduce)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustdoc_internals)]
|
||||
#![feature(try_blocks)]
|
||||
|
|
|
|||
|
|
@ -6,6 +6,7 @@
|
|||
|
||||
// tidy-alphabetical-start
|
||||
#![allow(internal_features)]
|
||||
#![cfg_attr(bootstrap, feature(let_chains))]
|
||||
#![doc(html_root_url = "https://doc.rust-lang.org/nightly/nightly-rustc/")]
|
||||
#![doc(rust_logo)]
|
||||
#![feature(assert_matches)]
|
||||
|
|
@ -13,7 +14,6 @@
|
|||
#![feature(box_patterns)]
|
||||
#![feature(if_let_guard)]
|
||||
#![feature(iterator_try_collect)]
|
||||
#![feature(let_chains)]
|
||||
#![feature(never_type)]
|
||||
#![feature(rustdoc_internals)]
|
||||
// tidy-alphabetical-end
|
||||
|
|
|
|||
|
|
@ -442,6 +442,14 @@ pub trait Predicate<I: Interner<Predicate = Self>>:
|
|||
{
|
||||
fn as_clause(self) -> Option<I::Clause>;
|
||||
|
||||
fn as_normalizes_to(self) -> Option<ty::Binder<I, ty::NormalizesTo<I>>> {
|
||||
let kind = self.kind();
|
||||
match kind.skip_binder() {
|
||||
ty::PredicateKind::NormalizesTo(pred) => Some(kind.rebind(pred)),
|
||||
_ => None,
|
||||
}
|
||||
}
|
||||
|
||||
// FIXME: Eventually uplift the impl out of rustc and make this defaulted.
|
||||
fn allow_normalization(self) -> bool;
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1138,6 +1138,10 @@ pub(crate) mod builtin {
|
|||
issue = "29599",
|
||||
reason = "`concat_idents` is not stable enough for use and is subject to change"
|
||||
)]
|
||||
#[deprecated(
|
||||
since = "1.88.0",
|
||||
note = "use `${concat(...)}` with the `macro_metavar_expr_concat` feature instead"
|
||||
)]
|
||||
#[rustc_builtin_macro]
|
||||
#[macro_export]
|
||||
macro_rules! concat_idents {
|
||||
|
|
|
|||
|
|
@ -162,8 +162,14 @@
|
|||
//! The [`is_some`] and [`is_none`] methods return [`true`] if the [`Option`]
|
||||
//! is [`Some`] or [`None`], respectively.
|
||||
//!
|
||||
//! The [`is_some_and`] and [`is_none_or`] methods apply the provided function
|
||||
//! to the contents of the [`Option`] to produce a boolean value.
|
||||
//! If this is [`None`] then a default result is returned instead without executing the function.
|
||||
//!
|
||||
//! [`is_none`]: Option::is_none
|
||||
//! [`is_some`]: Option::is_some
|
||||
//! [`is_some_and`]: Option::is_some_and
|
||||
//! [`is_none_or`]: Option::is_none_or
|
||||
//!
|
||||
//! ## Adapters for working with references
|
||||
//!
|
||||
|
|
@ -177,6 +183,10 @@
|
|||
//! <code>[Option]<[Pin]<[&]T>></code>
|
||||
//! * [`as_pin_mut`] converts from <code>[Pin]<[&mut] [Option]\<T>></code> to
|
||||
//! <code>[Option]<[Pin]<[&mut] T>></code>
|
||||
//! * [`as_slice`] returns a one-element slice of the contained value, if any.
|
||||
//! If this is [`None`], an empty slice is returned.
|
||||
//! * [`as_mut_slice`] returns a mutable one-element slice of the contained value, if any.
|
||||
//! If this is [`None`], an empty slice is returned.
|
||||
//!
|
||||
//! [&]: reference "shared reference"
|
||||
//! [&mut]: reference "mutable reference"
|
||||
|
|
@ -187,6 +197,8 @@
|
|||
//! [`as_pin_mut`]: Option::as_pin_mut
|
||||
//! [`as_pin_ref`]: Option::as_pin_ref
|
||||
//! [`as_ref`]: Option::as_ref
|
||||
//! [`as_slice`]: Option::as_slice
|
||||
//! [`as_mut_slice`]: Option::as_mut_slice
|
||||
//!
|
||||
//! ## Extracting the contained value
|
||||
//!
|
||||
|
|
@ -200,12 +212,15 @@
|
|||
//! (which must implement the [`Default`] trait)
|
||||
//! * [`unwrap_or_else`] returns the result of evaluating the provided
|
||||
//! function
|
||||
//! * [`unwrap_unchecked`] produces *[undefined behavior]*
|
||||
//!
|
||||
//! [`expect`]: Option::expect
|
||||
//! [`unwrap`]: Option::unwrap
|
||||
//! [`unwrap_or`]: Option::unwrap_or
|
||||
//! [`unwrap_or_default`]: Option::unwrap_or_default
|
||||
//! [`unwrap_or_else`]: Option::unwrap_or_else
|
||||
//! [`unwrap_unchecked`]: Option::unwrap_unchecked
|
||||
//! [undefined behavior]: https://doc.rust-lang.org/reference/behavior-considered-undefined.html
|
||||
//!
|
||||
//! ## Transforming contained values
|
||||
//!
|
||||
|
|
@ -230,8 +245,9 @@
|
|||
//! * [`filter`] calls the provided predicate function on the contained
|
||||
//! value `t` if the [`Option`] is [`Some(t)`], and returns [`Some(t)`]
|
||||
//! if the function returns `true`; otherwise, returns [`None`]
|
||||
//! * [`flatten`] removes one level of nesting from an
|
||||
//! [`Option<Option<T>>`]
|
||||
//! * [`flatten`] removes one level of nesting from an [`Option<Option<T>>`]
|
||||
//! * [`inspect`] method takes ownership of the [`Option`] and applies
|
||||
//! the provided function to the contained value by reference if [`Some`]
|
||||
//! * [`map`] transforms [`Option<T>`] to [`Option<U>`] by applying the
|
||||
//! provided function to the contained value of [`Some`] and leaving
|
||||
//! [`None`] values unchanged
|
||||
|
|
@ -239,6 +255,7 @@
|
|||
//! [`Some(t)`]: Some
|
||||
//! [`filter`]: Option::filter
|
||||
//! [`flatten`]: Option::flatten
|
||||
//! [`inspect`]: Option::inspect
|
||||
//! [`map`]: Option::map
|
||||
//!
|
||||
//! These methods transform [`Option<T>`] to a value of a possibly
|
||||
|
|
@ -621,6 +638,10 @@ impl<T> Option<T> {
|
|||
///
|
||||
/// let x: Option<u32> = None;
|
||||
/// assert_eq!(x.is_some_and(|x| x > 1), false);
|
||||
///
|
||||
/// let x: Option<String> = Some("ownership".to_string());
|
||||
/// assert_eq!(x.as_ref().is_some_and(|x| x.len() > 1), true);
|
||||
/// println!("still alive {:?}", x);
|
||||
/// ```
|
||||
#[must_use]
|
||||
#[inline]
|
||||
|
|
@ -665,6 +686,10 @@ impl<T> Option<T> {
|
|||
///
|
||||
/// let x: Option<u32> = None;
|
||||
/// assert_eq!(x.is_none_or(|x| x > 1), true);
|
||||
///
|
||||
/// let x: Option<String> = Some("ownership".to_string());
|
||||
/// assert_eq!(x.as_ref().is_none_or(|x| x.len() > 1), true);
|
||||
/// println!("still alive {:?}", x);
|
||||
/// ```
|
||||
#[must_use]
|
||||
#[inline]
|
||||
|
|
|
|||
|
|
@ -59,6 +59,7 @@ pub use crate::hash::macros::Hash;
|
|||
|
||||
#[stable(feature = "builtin_macro_prelude", since = "1.38.0")]
|
||||
#[allow(deprecated)]
|
||||
#[cfg_attr(bootstrap, allow(deprecated_in_future))]
|
||||
#[doc(no_inline)]
|
||||
pub use crate::{
|
||||
assert, cfg, column, compile_error, concat, concat_idents, env, file, format_args,
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
use crate::error::Error;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::path::{Path, PathBuf};
|
||||
use crate::sys::os as os_imp;
|
||||
use crate::sys::{env as env_imp, os as os_imp};
|
||||
use crate::{fmt, io, sys};
|
||||
|
||||
/// Returns the current working directory as a [`PathBuf`].
|
||||
|
|
@ -96,7 +96,7 @@ pub struct Vars {
|
|||
/// [`env::vars_os()`]: vars_os
|
||||
#[stable(feature = "env", since = "1.0.0")]
|
||||
pub struct VarsOs {
|
||||
inner: os_imp::Env,
|
||||
inner: env_imp::Env,
|
||||
}
|
||||
|
||||
/// Returns an iterator of (variable, value) pairs of strings, for all the
|
||||
|
|
@ -150,7 +150,7 @@ pub fn vars() -> Vars {
|
|||
#[must_use]
|
||||
#[stable(feature = "env", since = "1.0.0")]
|
||||
pub fn vars_os() -> VarsOs {
|
||||
VarsOs { inner: os_imp::env() }
|
||||
VarsOs { inner: env_imp::env() }
|
||||
}
|
||||
|
||||
#[stable(feature = "env", since = "1.0.0")]
|
||||
|
|
@ -259,7 +259,7 @@ pub fn var_os<K: AsRef<OsStr>>(key: K) -> Option<OsString> {
|
|||
}
|
||||
|
||||
fn _var_os(key: &OsStr) -> Option<OsString> {
|
||||
os_imp::getenv(key)
|
||||
env_imp::getenv(key)
|
||||
}
|
||||
|
||||
/// The error type for operations interacting with environment variables.
|
||||
|
|
@ -363,7 +363,7 @@ impl Error for VarError {
|
|||
#[stable(feature = "env", since = "1.0.0")]
|
||||
pub unsafe fn set_var<K: AsRef<OsStr>, V: AsRef<OsStr>>(key: K, value: V) {
|
||||
let (key, value) = (key.as_ref(), value.as_ref());
|
||||
unsafe { os_imp::setenv(key, value) }.unwrap_or_else(|e| {
|
||||
unsafe { env_imp::setenv(key, value) }.unwrap_or_else(|e| {
|
||||
panic!("failed to set environment variable `{key:?}` to `{value:?}`: {e}")
|
||||
})
|
||||
}
|
||||
|
|
@ -434,7 +434,7 @@ pub unsafe fn set_var<K: AsRef<OsStr>, V: AsRef<OsStr>>(key: K, value: V) {
|
|||
#[stable(feature = "env", since = "1.0.0")]
|
||||
pub unsafe fn remove_var<K: AsRef<OsStr>>(key: K) {
|
||||
let key = key.as_ref();
|
||||
unsafe { os_imp::unsetenv(key) }
|
||||
unsafe { env_imp::unsetenv(key) }
|
||||
.unwrap_or_else(|e| panic!("failed to remove environment variable `{key:?}`: {e}"))
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -709,6 +709,7 @@ pub use core::primitive;
|
|||
// Re-export built-in macros defined through core.
|
||||
#[stable(feature = "builtin_macro_prelude", since = "1.38.0")]
|
||||
#[allow(deprecated)]
|
||||
#[cfg_attr(bootstrap, allow(deprecated_in_future))]
|
||||
pub use core::{
|
||||
assert, assert_matches, cfg, column, compile_error, concat, concat_idents, const_format_args,
|
||||
env, file, format_args, format_args_nl, include, include_bytes, include_str, line, log_syntax,
|
||||
|
|
|
|||
|
|
@ -46,6 +46,7 @@ pub use crate::result::Result::{self, Err, Ok};
|
|||
// Re-exported built-in macros
|
||||
#[stable(feature = "builtin_macro_prelude", since = "1.38.0")]
|
||||
#[allow(deprecated)]
|
||||
#[cfg_attr(bootstrap, allow(deprecated_in_future))]
|
||||
#[doc(no_inline)]
|
||||
pub use core::prelude::v1::{
|
||||
assert, cfg, column, compile_error, concat, concat_idents, env, file, format_args,
|
||||
|
|
|
|||
|
|
@ -2,6 +2,16 @@
|
|||
|
||||
#![forbid(unsafe_op_in_unsafe_fn)]
|
||||
|
||||
#[cfg(any(
|
||||
all(target_family = "unix", not(any(target_os = "espidf", target_os = "vita"))),
|
||||
target_family = "windows",
|
||||
target_os = "hermit",
|
||||
target_os = "uefi",
|
||||
target_os = "wasi",
|
||||
target_os = "xous",
|
||||
))]
|
||||
mod common;
|
||||
|
||||
cfg_if::cfg_if! {
|
||||
if #[cfg(any(
|
||||
all(target_family = "unix", not(any(target_os = "espidf", target_os = "vita"))),
|
||||
|
|
|
|||
|
|
@ -1,14 +1,11 @@
|
|||
use r_efi::protocols::loaded_image;
|
||||
|
||||
pub use super::common::Args;
|
||||
use crate::env::current_exe;
|
||||
use crate::ffi::OsString;
|
||||
use crate::iter::Iterator;
|
||||
use crate::sys::pal::helpers;
|
||||
|
||||
#[path = "common.rs"]
|
||||
mod common;
|
||||
pub use common::Args;
|
||||
|
||||
pub fn args() -> Args {
|
||||
let lazy_current_exe = || Vec::from([current_exe().map(Into::into).unwrap_or_default()]);
|
||||
|
||||
|
|
|
|||
|
|
@ -5,16 +5,13 @@
|
|||
|
||||
#![allow(dead_code)] // runtime init functions not used during testing
|
||||
|
||||
pub use super::common::Args;
|
||||
use crate::ffi::CStr;
|
||||
#[cfg(target_os = "hermit")]
|
||||
use crate::os::hermit::ffi::OsStringExt;
|
||||
#[cfg(not(target_os = "hermit"))]
|
||||
use crate::os::unix::ffi::OsStringExt;
|
||||
|
||||
#[path = "common.rs"]
|
||||
mod common;
|
||||
pub use common::Args;
|
||||
|
||||
/// One-time global initialization.
|
||||
pub unsafe fn init(argc: isize, argv: *const *const u8) {
|
||||
unsafe { imp::init(argc, argv) }
|
||||
|
|
|
|||
|
|
@ -1,12 +1,9 @@
|
|||
#![forbid(unsafe_op_in_unsafe_fn)]
|
||||
|
||||
pub use super::common::Args;
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::os::wasi::ffi::OsStrExt;
|
||||
|
||||
#[path = "common.rs"]
|
||||
mod common;
|
||||
pub use common::Args;
|
||||
|
||||
/// Returns the command line arguments
|
||||
pub fn args() -> Args {
|
||||
Args::new(maybe_args().unwrap_or(Vec::new()))
|
||||
|
|
|
|||
|
|
@ -6,6 +6,7 @@
|
|||
#[cfg(test)]
|
||||
mod tests;
|
||||
|
||||
pub use super::common::Args;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::num::NonZero;
|
||||
use crate::os::windows::prelude::*;
|
||||
|
|
@ -18,10 +19,6 @@ use crate::sys_common::AsInner;
|
|||
use crate::sys_common::wstr::WStrUnits;
|
||||
use crate::{io, iter, ptr};
|
||||
|
||||
#[path = "common.rs"]
|
||||
mod common;
|
||||
pub use common::Args;
|
||||
|
||||
pub fn args() -> Args {
|
||||
// SAFETY: `GetCommandLineW` returns a pointer to a null terminated UTF-16
|
||||
// string so it's safe for `WStrUnits` to use.
|
||||
|
|
|
|||
|
|
@ -1,10 +1,7 @@
|
|||
pub use super::common::Args;
|
||||
use crate::sys::pal::os::get_application_parameters;
|
||||
use crate::sys::pal::os::params::ArgumentList;
|
||||
|
||||
#[path = "common.rs"]
|
||||
mod common;
|
||||
pub use common::Args;
|
||||
|
||||
pub fn args() -> Args {
|
||||
let Some(params) = get_application_parameters() else {
|
||||
return Args::new(vec![]);
|
||||
|
|
|
|||
48
library/std/src/sys/env/common.rs
vendored
Normal file
48
library/std/src/sys/env/common.rs
vendored
Normal file
|
|
@ -0,0 +1,48 @@
|
|||
use crate::ffi::OsString;
|
||||
use crate::{fmt, vec};
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
f.debug_list()
|
||||
.entries(self.slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub(super) fn new(env: Vec<(OsString, OsString)>) -> Self {
|
||||
Env { iter: env.into_iter() }
|
||||
}
|
||||
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
EnvStrDebug { slice: self.iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
f.debug_list().entries(self.iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
72
library/std/src/sys/env/hermit.rs
vendored
Normal file
72
library/std/src/sys/env/hermit.rs
vendored
Normal file
|
|
@ -0,0 +1,72 @@
|
|||
use core::slice::memchr;
|
||||
|
||||
pub use super::common::Env;
|
||||
use crate::collections::HashMap;
|
||||
use crate::ffi::{CStr, OsStr, OsString, c_char};
|
||||
use crate::io;
|
||||
use crate::os::hermit::ffi::OsStringExt;
|
||||
use crate::sync::Mutex;
|
||||
|
||||
static ENV: Mutex<Option<HashMap<OsString, OsString>>> = Mutex::new(None);
|
||||
|
||||
pub fn init(env: *const *const c_char) {
|
||||
let mut guard = ENV.lock().unwrap();
|
||||
let map = guard.insert(HashMap::new());
|
||||
|
||||
if env.is_null() {
|
||||
return;
|
||||
}
|
||||
|
||||
unsafe {
|
||||
let mut environ = env;
|
||||
while !(*environ).is_null() {
|
||||
if let Some((key, value)) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
map.insert(key, value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
// Strategy (copied from glibc): Variable name and value are separated
|
||||
// by an ASCII equals sign '='. Since a variable name must not be
|
||||
// empty, allow variable names starting with an equals sign. Skip all
|
||||
// malformed lines.
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
/// Returns a vector of (variable, value) byte-vector pairs for all the
|
||||
/// environment variables of the current process.
|
||||
pub fn env() -> Env {
|
||||
let guard = ENV.lock().unwrap();
|
||||
let env = guard.as_ref().unwrap();
|
||||
|
||||
let result = env.iter().map(|(key, value)| (key.clone(), value.clone())).collect();
|
||||
|
||||
Env::new(result)
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
ENV.lock().unwrap().as_ref().unwrap().get(k).cloned()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
let (k, v) = (k.to_owned(), v.to_owned());
|
||||
ENV.lock().unwrap().as_mut().unwrap().insert(k, v);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(k: &OsStr) -> io::Result<()> {
|
||||
ENV.lock().unwrap().as_mut().unwrap().remove(k);
|
||||
Ok(())
|
||||
}
|
||||
48
library/std/src/sys/env/mod.rs
vendored
Normal file
48
library/std/src/sys/env/mod.rs
vendored
Normal file
|
|
@ -0,0 +1,48 @@
|
|||
//! Platform-dependent environment variables abstraction.
|
||||
|
||||
#![forbid(unsafe_op_in_unsafe_fn)]
|
||||
|
||||
#[cfg(any(
|
||||
target_family = "unix",
|
||||
target_os = "hermit",
|
||||
all(target_vendor = "fortanix", target_env = "sgx"),
|
||||
target_os = "solid_asp3",
|
||||
target_os = "uefi",
|
||||
target_os = "wasi",
|
||||
target_os = "xous",
|
||||
))]
|
||||
mod common;
|
||||
|
||||
cfg_if::cfg_if! {
|
||||
if #[cfg(target_family = "unix")] {
|
||||
mod unix;
|
||||
pub use unix::*;
|
||||
} else if #[cfg(target_family = "windows")] {
|
||||
mod windows;
|
||||
pub use windows::*;
|
||||
} else if #[cfg(target_os = "hermit")] {
|
||||
mod hermit;
|
||||
pub use hermit::*;
|
||||
} else if #[cfg(all(target_vendor = "fortanix", target_env = "sgx"))] {
|
||||
mod sgx;
|
||||
pub use sgx::*;
|
||||
} else if #[cfg(target_os = "solid_asp3")] {
|
||||
mod solid;
|
||||
pub use solid::*;
|
||||
} else if #[cfg(target_os = "uefi")] {
|
||||
mod uefi;
|
||||
pub use uefi::*;
|
||||
} else if #[cfg(target_os = "wasi")] {
|
||||
mod wasi;
|
||||
pub use wasi::*;
|
||||
} else if #[cfg(target_os = "xous")] {
|
||||
mod xous;
|
||||
pub use xous::*;
|
||||
} else if #[cfg(target_os = "zkvm")] {
|
||||
mod zkvm;
|
||||
pub use zkvm::*;
|
||||
} else {
|
||||
mod unsupported;
|
||||
pub use unsupported::*;
|
||||
}
|
||||
}
|
||||
55
library/std/src/sys/env/sgx.rs
vendored
Normal file
55
library/std/src/sys/env/sgx.rs
vendored
Normal file
|
|
@ -0,0 +1,55 @@
|
|||
#![allow(fuzzy_provenance_casts)] // FIXME: this module systematically confuses pointers and integers
|
||||
|
||||
pub use super::common::Env;
|
||||
use crate::collections::HashMap;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::sync::atomic::{AtomicUsize, Ordering};
|
||||
use crate::sync::{Mutex, Once};
|
||||
|
||||
// Specifying linkage/symbol name is solely to ensure a single instance between this crate and its unit tests
|
||||
#[cfg_attr(test, linkage = "available_externally")]
|
||||
#[unsafe(export_name = "_ZN16__rust_internals3std3sys3pal3sgx2os3ENVE")]
|
||||
static ENV: AtomicUsize = AtomicUsize::new(0);
|
||||
// Specifying linkage/symbol name is solely to ensure a single instance between this crate and its unit tests
|
||||
#[cfg_attr(test, linkage = "available_externally")]
|
||||
#[unsafe(export_name = "_ZN16__rust_internals3std3sys3pal3sgx2os8ENV_INITE")]
|
||||
static ENV_INIT: Once = Once::new();
|
||||
type EnvStore = Mutex<HashMap<OsString, OsString>>;
|
||||
|
||||
fn get_env_store() -> Option<&'static EnvStore> {
|
||||
unsafe { (ENV.load(Ordering::Relaxed) as *const EnvStore).as_ref() }
|
||||
}
|
||||
|
||||
fn create_env_store() -> &'static EnvStore {
|
||||
ENV_INIT.call_once(|| {
|
||||
ENV.store(Box::into_raw(Box::new(EnvStore::default())) as _, Ordering::Relaxed)
|
||||
});
|
||||
unsafe { &*(ENV.load(Ordering::Relaxed) as *const EnvStore) }
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
let clone_to_vec = |map: &HashMap<OsString, OsString>| -> Vec<_> {
|
||||
map.iter().map(|(k, v)| (k.clone(), v.clone())).collect()
|
||||
};
|
||||
|
||||
let env = get_env_store().map(|env| clone_to_vec(&env.lock().unwrap())).unwrap_or_default();
|
||||
Env::new(env)
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
get_env_store().and_then(|s| s.lock().unwrap().get(k).cloned())
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
let (k, v) = (k.to_owned(), v.to_owned());
|
||||
create_env_store().lock().unwrap().insert(k, v);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(k: &OsStr) -> io::Result<()> {
|
||||
if let Some(env) = get_env_store() {
|
||||
env.lock().unwrap().remove(k);
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
96
library/std/src/sys/env/solid.rs
vendored
Normal file
96
library/std/src/sys/env/solid.rs
vendored
Normal file
|
|
@ -0,0 +1,96 @@
|
|||
use core::slice::memchr;
|
||||
|
||||
pub use super::common::Env;
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::os::raw::{c_char, c_int};
|
||||
use crate::os::solid::ffi::{OsStrExt, OsStringExt};
|
||||
use crate::sync::{PoisonError, RwLock};
|
||||
use crate::sys::common::small_c_string::run_with_cstr;
|
||||
|
||||
static ENV_LOCK: RwLock<()> = RwLock::new(());
|
||||
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
ENV_LOCK.read().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
|
||||
/// Returns a vector of (variable, value) byte-vector pairs for all the
|
||||
/// environment variables of the current process.
|
||||
pub fn env() -> Env {
|
||||
unsafe extern "C" {
|
||||
static mut environ: *const *const c_char;
|
||||
}
|
||||
|
||||
unsafe {
|
||||
let _guard = env_read_lock();
|
||||
let mut result = Vec::new();
|
||||
if !environ.is_null() {
|
||||
while !(*environ).is_null() {
|
||||
if let Some(key_value) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
result.push(key_value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
return Env::new(result);
|
||||
}
|
||||
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
// Strategy (copied from glibc): Variable name and value are separated
|
||||
// by an ASCII equals sign '='. Since a variable name must not be
|
||||
// empty, allow variable names starting with an equals sign. Skip all
|
||||
// malformed lines.
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
// environment variables with a nul byte can't be set, so their value is
|
||||
// always None as well
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
let _guard = env_read_lock();
|
||||
let v = unsafe { libc::getenv(k.as_ptr()) } as *const libc::c_char;
|
||||
|
||||
if v.is_null() {
|
||||
Ok(None)
|
||||
} else {
|
||||
// SAFETY: `v` cannot be mutated while executing this line since we've a read lock
|
||||
let bytes = unsafe { CStr::from_ptr(v) }.to_bytes().to_vec();
|
||||
|
||||
Ok(Some(OsStringExt::from_vec(bytes)))
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
.flatten()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
run_with_cstr(v.as_bytes(), &|v| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt_env(unsafe { libc::setenv(k.as_ptr(), v.as_ptr(), 1) }).map(drop)
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(n.as_bytes(), &|nbuf| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt_env(unsafe { libc::unsetenv(nbuf.as_ptr()) }).map(drop)
|
||||
})
|
||||
}
|
||||
|
||||
/// In kmclib, `setenv` and `unsetenv` don't always set `errno`, so this
|
||||
/// function just returns a generic error.
|
||||
fn cvt_env(t: c_int) -> io::Result<c_int> {
|
||||
if t == -1 { Err(io::const_error!(io::ErrorKind::Uncategorized, "failure")) } else { Ok(t) }
|
||||
}
|
||||
102
library/std/src/sys/env/uefi.rs
vendored
Normal file
102
library/std/src/sys/env/uefi.rs
vendored
Normal file
|
|
@ -0,0 +1,102 @@
|
|||
pub use super::common::Env;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::io;
|
||||
|
||||
pub fn env() -> Env {
|
||||
let env = uefi_env::get_all().expect("not supported on this platform");
|
||||
Env::new(env)
|
||||
}
|
||||
|
||||
pub fn getenv(key: &OsStr) -> Option<OsString> {
|
||||
uefi_env::get(key)
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(key: &OsStr, val: &OsStr) -> io::Result<()> {
|
||||
uefi_env::set(key, val)
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(key: &OsStr) -> io::Result<()> {
|
||||
uefi_env::unset(key)
|
||||
}
|
||||
|
||||
mod uefi_env {
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::os::uefi::ffi::OsStringExt;
|
||||
use crate::ptr::NonNull;
|
||||
use crate::sys::{helpers, unsupported_err};
|
||||
|
||||
pub(crate) fn get(key: &OsStr) -> Option<OsString> {
|
||||
let shell = helpers::open_shell()?;
|
||||
let mut key_ptr = helpers::os_string_to_raw(key)?;
|
||||
unsafe { get_raw(shell, key_ptr.as_mut_ptr()) }
|
||||
}
|
||||
|
||||
pub(crate) fn set(key: &OsStr, val: &OsStr) -> io::Result<()> {
|
||||
let mut key_ptr = helpers::os_string_to_raw(key)
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid key"))?;
|
||||
let mut val_ptr = helpers::os_string_to_raw(val)
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid value"))?;
|
||||
unsafe { set_raw(key_ptr.as_mut_ptr(), val_ptr.as_mut_ptr()) }
|
||||
}
|
||||
|
||||
pub(crate) fn unset(key: &OsStr) -> io::Result<()> {
|
||||
let mut key_ptr = helpers::os_string_to_raw(key)
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid key"))?;
|
||||
unsafe { set_raw(key_ptr.as_mut_ptr(), crate::ptr::null_mut()) }
|
||||
}
|
||||
|
||||
pub(crate) fn get_all() -> io::Result<Vec<(OsString, OsString)>> {
|
||||
let shell = helpers::open_shell().ok_or(unsupported_err())?;
|
||||
|
||||
let mut vars = Vec::new();
|
||||
let val = unsafe { ((*shell.as_ptr()).get_env)(crate::ptr::null_mut()) };
|
||||
|
||||
if val.is_null() {
|
||||
return Ok(vars);
|
||||
}
|
||||
|
||||
let mut start = 0;
|
||||
|
||||
// UEFI Shell returns all keys separated by NULL.
|
||||
// End of string is denoted by two NULLs
|
||||
for i in 0.. {
|
||||
if unsafe { *val.add(i) } == 0 {
|
||||
// Two NULL signal end of string
|
||||
if i == start {
|
||||
break;
|
||||
}
|
||||
|
||||
let key = OsString::from_wide(unsafe {
|
||||
crate::slice::from_raw_parts(val.add(start), i - start)
|
||||
});
|
||||
// SAFETY: val.add(start) is always NULL terminated
|
||||
let val = unsafe { get_raw(shell, val.add(start)) }
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid value"))?;
|
||||
|
||||
vars.push((key, val));
|
||||
start = i + 1;
|
||||
}
|
||||
}
|
||||
|
||||
Ok(vars)
|
||||
}
|
||||
|
||||
unsafe fn get_raw(
|
||||
shell: NonNull<r_efi::efi::protocols::shell::Protocol>,
|
||||
key_ptr: *mut r_efi::efi::Char16,
|
||||
) -> Option<OsString> {
|
||||
let val = unsafe { ((*shell.as_ptr()).get_env)(key_ptr) };
|
||||
helpers::os_string_from_raw(val)
|
||||
}
|
||||
|
||||
unsafe fn set_raw(
|
||||
key_ptr: *mut r_efi::efi::Char16,
|
||||
val_ptr: *mut r_efi::efi::Char16,
|
||||
) -> io::Result<()> {
|
||||
let shell = helpers::open_shell().ok_or(unsupported_err())?;
|
||||
let r =
|
||||
unsafe { ((*shell.as_ptr()).set_env)(key_ptr, val_ptr, r_efi::efi::Boolean::FALSE) };
|
||||
if r.is_error() { Err(io::Error::from_raw_os_error(r.as_usize())) } else { Ok(()) }
|
||||
}
|
||||
}
|
||||
126
library/std/src/sys/env/unix.rs
vendored
Normal file
126
library/std/src/sys/env/unix.rs
vendored
Normal file
|
|
@ -0,0 +1,126 @@
|
|||
use core::slice::memchr;
|
||||
|
||||
use libc::c_char;
|
||||
|
||||
pub use super::common::Env;
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::os::unix::prelude::*;
|
||||
use crate::sync::{PoisonError, RwLock};
|
||||
use crate::sys::common::small_c_string::run_with_cstr;
|
||||
use crate::sys::cvt;
|
||||
|
||||
// Use `_NSGetEnviron` on Apple platforms.
|
||||
//
|
||||
// `_NSGetEnviron` is the documented alternative (see `man environ`), and has
|
||||
// been available since the first versions of both macOS and iOS.
|
||||
//
|
||||
// Nowadays, specifically since macOS 10.8, `environ` has been exposed through
|
||||
// `libdyld.dylib`, which is linked via. `libSystem.dylib`:
|
||||
// <https://github.com/apple-oss-distributions/dyld/blob/dyld-1160.6/libdyld/libdyldGlue.cpp#L913>
|
||||
//
|
||||
// So in the end, it likely doesn't really matter which option we use, but the
|
||||
// performance cost of using `_NSGetEnviron` is extremely miniscule, and it
|
||||
// might be ever so slightly more supported, so let's just use that.
|
||||
//
|
||||
// NOTE: The header where this is defined (`crt_externs.h`) was added to the
|
||||
// iOS 13.0 SDK, which has been the source of a great deal of confusion in the
|
||||
// past about the availability of this API.
|
||||
//
|
||||
// NOTE(madsmtm): Neither this nor using `environ` has been verified to not
|
||||
// cause App Store rejections; if this is found to be the case, an alternative
|
||||
// implementation of this is possible using `[NSProcessInfo environment]`
|
||||
// - which internally uses `_NSGetEnviron` and a system-wide lock on the
|
||||
// environment variables to protect against `setenv`, so using that might be
|
||||
// desirable anyhow? Though it also means that we have to link to Foundation.
|
||||
#[cfg(target_vendor = "apple")]
|
||||
pub unsafe fn environ() -> *mut *const *const c_char {
|
||||
unsafe { libc::_NSGetEnviron() as *mut *const *const c_char }
|
||||
}
|
||||
|
||||
// Use the `environ` static which is part of POSIX.
|
||||
#[cfg(not(target_vendor = "apple"))]
|
||||
pub unsafe fn environ() -> *mut *const *const c_char {
|
||||
unsafe extern "C" {
|
||||
static mut environ: *const *const c_char;
|
||||
}
|
||||
&raw mut environ
|
||||
}
|
||||
|
||||
static ENV_LOCK: RwLock<()> = RwLock::new(());
|
||||
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
ENV_LOCK.read().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
|
||||
/// Returns a vector of (variable, value) byte-vector pairs for all the
|
||||
/// environment variables of the current process.
|
||||
pub fn env() -> Env {
|
||||
unsafe {
|
||||
let _guard = env_read_lock();
|
||||
let mut environ = *environ();
|
||||
let mut result = Vec::new();
|
||||
if !environ.is_null() {
|
||||
while !(*environ).is_null() {
|
||||
if let Some(key_value) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
result.push(key_value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
return Env::new(result);
|
||||
}
|
||||
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
// Strategy (copied from glibc): Variable name and value are separated
|
||||
// by an ASCII equals sign '='. Since a variable name must not be
|
||||
// empty, allow variable names starting with an equals sign. Skip all
|
||||
// malformed lines.
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
// environment variables with a nul byte can't be set, so their value is
|
||||
// always None as well
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
let _guard = env_read_lock();
|
||||
let v = unsafe { libc::getenv(k.as_ptr()) } as *const libc::c_char;
|
||||
|
||||
if v.is_null() {
|
||||
Ok(None)
|
||||
} else {
|
||||
// SAFETY: `v` cannot be mutated while executing this line since we've a read lock
|
||||
let bytes = unsafe { CStr::from_ptr(v) }.to_bytes().to_vec();
|
||||
|
||||
Ok(Some(OsStringExt::from_vec(bytes)))
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
.flatten()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
run_with_cstr(v.as_bytes(), &|v| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt(unsafe { libc::setenv(k.as_ptr(), v.as_ptr(), 1) }).map(drop)
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(n.as_bytes(), &|nbuf| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt(unsafe { libc::unsetenv(nbuf.as_ptr()) }).map(drop)
|
||||
})
|
||||
}
|
||||
40
library/std/src/sys/env/unsupported.rs
vendored
Normal file
40
library/std/src/sys/env/unsupported.rs
vendored
Normal file
|
|
@ -0,0 +1,40 @@
|
|||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::{fmt, io};
|
||||
|
||||
pub struct Env(!);
|
||||
|
||||
impl Env {
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
self.0
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, _: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
self.0
|
||||
}
|
||||
}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.0
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
panic!("not supported on this platform")
|
||||
}
|
||||
|
||||
pub fn getenv(_: &OsStr) -> Option<OsString> {
|
||||
None
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(_: &OsStr, _: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot set env vars on this platform"))
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(_: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot unset env vars on this platform"))
|
||||
}
|
||||
102
library/std/src/sys/env/wasi.rs
vendored
Normal file
102
library/std/src/sys/env/wasi.rs
vendored
Normal file
|
|
@ -0,0 +1,102 @@
|
|||
use core::slice::memchr;
|
||||
|
||||
pub use super::common::Env;
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::os::wasi::prelude::*;
|
||||
use crate::sys::common::small_c_string::run_with_cstr;
|
||||
use crate::sys::pal::os::{cvt, libc};
|
||||
|
||||
cfg_if::cfg_if! {
|
||||
if #[cfg(target_feature = "atomics")] {
|
||||
// Access to the environment must be protected by a lock in multi-threaded scenarios.
|
||||
use crate::sync::{PoisonError, RwLock};
|
||||
static ENV_LOCK: RwLock<()> = RwLock::new(());
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
ENV_LOCK.read().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
pub fn env_write_lock() -> impl Drop {
|
||||
ENV_LOCK.write().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
} else {
|
||||
// No need for a lock if we are single-threaded.
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
Box::new(())
|
||||
}
|
||||
pub fn env_write_lock() -> impl Drop {
|
||||
Box::new(())
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
unsafe {
|
||||
let _guard = env_read_lock();
|
||||
|
||||
// Use `__wasilibc_get_environ` instead of `environ` here so that we
|
||||
// don't require wasi-libc to eagerly initialize the environment
|
||||
// variables.
|
||||
let mut environ = libc::__wasilibc_get_environ();
|
||||
|
||||
let mut result = Vec::new();
|
||||
if !environ.is_null() {
|
||||
while !(*environ).is_null() {
|
||||
if let Some(key_value) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
result.push(key_value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
return Env::new(result);
|
||||
}
|
||||
|
||||
// See src/libstd/sys/pal/unix/os.rs, same as that
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
// environment variables with a nul byte can't be set, so their value is
|
||||
// always None as well
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
let _guard = env_read_lock();
|
||||
let v = unsafe { libc::getenv(k.as_ptr()) } as *const libc::c_char;
|
||||
|
||||
if v.is_null() {
|
||||
Ok(None)
|
||||
} else {
|
||||
// SAFETY: `v` cannot be mutated while executing this line since we've a read lock
|
||||
let bytes = unsafe { CStr::from_ptr(v) }.to_bytes().to_vec();
|
||||
|
||||
Ok(Some(OsStringExt::from_vec(bytes)))
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
.flatten()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
run_with_cstr(v.as_bytes(), &|v| unsafe {
|
||||
let _guard = env_write_lock();
|
||||
cvt(libc::setenv(k.as_ptr(), v.as_ptr(), 1)).map(drop)
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(n.as_bytes(), &|nbuf| unsafe {
|
||||
let _guard = env_write_lock();
|
||||
cvt(libc::unsetenv(nbuf.as_ptr())).map(drop)
|
||||
})
|
||||
}
|
||||
133
library/std/src/sys/env/windows.rs
vendored
Normal file
133
library/std/src/sys/env/windows.rs
vendored
Normal file
|
|
@ -0,0 +1,133 @@
|
|||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::os::windows::prelude::*;
|
||||
use crate::sys::pal::{c, cvt, fill_utf16_buf, to_u16s};
|
||||
use crate::{fmt, io, ptr, slice};
|
||||
|
||||
pub struct Env {
|
||||
base: *mut c::WCHAR,
|
||||
iter: EnvIterator,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
iter: &'a EnvIterator,
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
let iter: EnvIterator = (*iter).clone();
|
||||
let mut list = f.debug_list();
|
||||
for (a, b) in iter {
|
||||
list.entry(&(a.to_str().unwrap(), b.to_str().unwrap()));
|
||||
}
|
||||
list.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { base: _, iter } = self;
|
||||
EnvStrDebug { iter }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { base: _, iter } = self;
|
||||
f.debug_list().entries(iter.clone()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
let Self { base: _, iter } = self;
|
||||
iter.next()
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
struct EnvIterator(*mut c::WCHAR);
|
||||
|
||||
impl Iterator for EnvIterator {
|
||||
type Item = (OsString, OsString);
|
||||
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
let Self(cur) = self;
|
||||
loop {
|
||||
unsafe {
|
||||
if **cur == 0 {
|
||||
return None;
|
||||
}
|
||||
let p = *cur as *const u16;
|
||||
let mut len = 0;
|
||||
while *p.add(len) != 0 {
|
||||
len += 1;
|
||||
}
|
||||
let s = slice::from_raw_parts(p, len);
|
||||
*cur = cur.add(len + 1);
|
||||
|
||||
// Windows allows environment variables to start with an equals
|
||||
// symbol (in any other position, this is the separator between
|
||||
// variable name and value). Since`s` has at least length 1 at
|
||||
// this point (because the empty string terminates the array of
|
||||
// environment variables), we can safely slice.
|
||||
let pos = match s[1..].iter().position(|&u| u == b'=' as u16).map(|p| p + 1) {
|
||||
Some(p) => p,
|
||||
None => continue,
|
||||
};
|
||||
return Some((
|
||||
OsStringExt::from_wide(&s[..pos]),
|
||||
OsStringExt::from_wide(&s[pos + 1..]),
|
||||
));
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for Env {
|
||||
fn drop(&mut self) {
|
||||
unsafe {
|
||||
c::FreeEnvironmentStringsW(self.base);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
unsafe {
|
||||
let ch = c::GetEnvironmentStringsW();
|
||||
if ch.is_null() {
|
||||
panic!("failure getting env string from OS: {}", io::Error::last_os_error());
|
||||
}
|
||||
Env { base: ch, iter: EnvIterator(ch) }
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
let k = to_u16s(k).ok()?;
|
||||
fill_utf16_buf(
|
||||
|buf, sz| unsafe { c::GetEnvironmentVariableW(k.as_ptr(), buf, sz) },
|
||||
OsStringExt::from_wide,
|
||||
)
|
||||
.ok()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
// SAFETY: We ensure that k and v are null-terminated wide strings.
|
||||
unsafe {
|
||||
let k = to_u16s(k)?;
|
||||
let v = to_u16s(v)?;
|
||||
|
||||
cvt(c::SetEnvironmentVariableW(k.as_ptr(), v.as_ptr())).map(drop)
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
// SAFETY: We ensure that v is a null-terminated wide strings.
|
||||
unsafe {
|
||||
let v = to_u16s(n)?;
|
||||
cvt(c::SetEnvironmentVariableW(v.as_ptr(), ptr::null())).map(drop)
|
||||
}
|
||||
}
|
||||
54
library/std/src/sys/env/xous.rs
vendored
Normal file
54
library/std/src/sys/env/xous.rs
vendored
Normal file
|
|
@ -0,0 +1,54 @@
|
|||
pub use super::common::Env;
|
||||
use crate::collections::HashMap;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::sync::atomic::{AtomicUsize, Ordering};
|
||||
use crate::sync::{Mutex, Once};
|
||||
use crate::sys::pal::os::{get_application_parameters, params};
|
||||
|
||||
static ENV: AtomicUsize = AtomicUsize::new(0);
|
||||
static ENV_INIT: Once = Once::new();
|
||||
type EnvStore = Mutex<HashMap<OsString, OsString>>;
|
||||
|
||||
fn get_env_store() -> &'static EnvStore {
|
||||
ENV_INIT.call_once(|| {
|
||||
let env_store = EnvStore::default();
|
||||
if let Some(params) = get_application_parameters() {
|
||||
for param in params {
|
||||
if let Ok(envs) = params::EnvironmentBlock::try_from(¶m) {
|
||||
let mut env_store = env_store.lock().unwrap();
|
||||
for env in envs {
|
||||
env_store.insert(env.key.into(), env.value.into());
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
ENV.store(Box::into_raw(Box::new(env_store)) as _, Ordering::Relaxed)
|
||||
});
|
||||
unsafe { &*core::ptr::with_exposed_provenance::<EnvStore>(ENV.load(Ordering::Relaxed)) }
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
let clone_to_vec = |map: &HashMap<OsString, OsString>| -> Vec<_> {
|
||||
map.iter().map(|(k, v)| (k.clone(), v.clone())).collect()
|
||||
};
|
||||
|
||||
let env = clone_to_vec(&*get_env_store().lock().unwrap());
|
||||
Env::new(env)
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
get_env_store().lock().unwrap().get(k).cloned()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
let (k, v) = (k.to_owned(), v.to_owned());
|
||||
get_env_store().lock().unwrap().insert(k, v);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(k: &OsStr) -> io::Result<()> {
|
||||
get_env_store().lock().unwrap().remove(k);
|
||||
Ok(())
|
||||
}
|
||||
32
library/std/src/sys/env/zkvm.rs
vendored
Normal file
32
library/std/src/sys/env/zkvm.rs
vendored
Normal file
|
|
@ -0,0 +1,32 @@
|
|||
#[expect(dead_code)]
|
||||
#[path = "unsupported.rs"]
|
||||
mod unsupported_env;
|
||||
pub use unsupported_env::{Env, env, setenv, unsetenv};
|
||||
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::sys::os_str;
|
||||
use crate::sys::pal::{WORD_SIZE, abi};
|
||||
use crate::sys_common::FromInner;
|
||||
|
||||
pub fn getenv(varname: &OsStr) -> Option<OsString> {
|
||||
let varname = varname.as_encoded_bytes();
|
||||
let nbytes =
|
||||
unsafe { abi::sys_getenv(crate::ptr::null_mut(), 0, varname.as_ptr(), varname.len()) };
|
||||
if nbytes == usize::MAX {
|
||||
return None;
|
||||
}
|
||||
|
||||
let nwords = (nbytes + WORD_SIZE - 1) / WORD_SIZE;
|
||||
let words = unsafe { abi::sys_alloc_words(nwords) };
|
||||
|
||||
let nbytes2 = unsafe { abi::sys_getenv(words, nwords, varname.as_ptr(), varname.len()) };
|
||||
debug_assert_eq!(nbytes, nbytes2);
|
||||
|
||||
// Convert to OsString.
|
||||
//
|
||||
// FIXME: We can probably get rid of the extra copy here if we
|
||||
// reimplement "os_str" instead of just using the generic unix
|
||||
// "os_str".
|
||||
let u8s: &[u8] = unsafe { crate::slice::from_raw_parts(words.cast() as *const u8, nbytes) };
|
||||
Some(OsString::from_inner(os_str::Buf { inner: u8s.to_vec() }))
|
||||
}
|
||||
|
|
@ -12,6 +12,7 @@ pub mod anonymous_pipe;
|
|||
pub mod args;
|
||||
pub mod backtrace;
|
||||
pub mod cmath;
|
||||
pub mod env;
|
||||
pub mod env_consts;
|
||||
pub mod exit_guard;
|
||||
pub mod fd;
|
||||
|
|
|
|||
|
|
@ -16,7 +16,10 @@
|
|||
#![deny(unsafe_op_in_unsafe_fn)]
|
||||
#![allow(missing_docs, nonstandard_style)]
|
||||
|
||||
use crate::io::ErrorKind;
|
||||
use crate::os::hermit::hermit_abi;
|
||||
use crate::os::raw::c_char;
|
||||
use crate::sys::env;
|
||||
|
||||
pub mod futex;
|
||||
pub mod os;
|
||||
|
|
@ -25,9 +28,6 @@ pub mod pipe;
|
|||
pub mod thread;
|
||||
pub mod time;
|
||||
|
||||
use crate::io::ErrorKind;
|
||||
use crate::os::hermit::hermit_abi;
|
||||
|
||||
pub fn unsupported<T>() -> crate::io::Result<T> {
|
||||
Err(unsupported_err())
|
||||
}
|
||||
|
|
@ -76,7 +76,7 @@ pub unsafe extern "C" fn runtime_entry(
|
|||
}
|
||||
|
||||
// initialize environment
|
||||
os::init_environment(env);
|
||||
env::init(env);
|
||||
|
||||
let result = unsafe { main(argc as isize, argv) };
|
||||
|
||||
|
|
|
|||
|
|
@ -1,15 +1,10 @@
|
|||
use core::slice::memchr;
|
||||
|
||||
use super::hermit_abi;
|
||||
use crate::collections::HashMap;
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{CStr, OsStr, OsString, c_char};
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::marker::PhantomData;
|
||||
use crate::os::hermit::ffi::OsStringExt;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sync::Mutex;
|
||||
use crate::sys::unsupported;
|
||||
use crate::{fmt, io, str, vec};
|
||||
use crate::{fmt, io, str};
|
||||
|
||||
pub fn errno() -> i32 {
|
||||
unsafe { hermit_abi::get_errno() }
|
||||
|
|
@ -68,115 +63,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
static ENV: Mutex<Option<HashMap<OsString, OsString>>> = Mutex::new(None);
|
||||
|
||||
pub fn init_environment(env: *const *const c_char) {
|
||||
let mut guard = ENV.lock().unwrap();
|
||||
let map = guard.insert(HashMap::new());
|
||||
|
||||
if env.is_null() {
|
||||
return;
|
||||
}
|
||||
|
||||
unsafe {
|
||||
let mut environ = env;
|
||||
while !(*environ).is_null() {
|
||||
if let Some((key, value)) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
map.insert(key, value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
// Strategy (copied from glibc): Variable name and value are separated
|
||||
// by an ASCII equals sign '='. Since a variable name must not be
|
||||
// empty, allow variable names starting with an equals sign. Skip all
|
||||
// malformed lines.
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { slice } = self;
|
||||
f.debug_list()
|
||||
.entries(slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { iter } = self;
|
||||
EnvStrDebug { slice: iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
f.debug_list().entries(iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
|
||||
/// Returns a vector of (variable, value) byte-vector pairs for all the
|
||||
/// environment variables of the current process.
|
||||
pub fn env() -> Env {
|
||||
let guard = ENV.lock().unwrap();
|
||||
let env = guard.as_ref().unwrap();
|
||||
|
||||
let result = env.iter().map(|(key, value)| (key.clone(), value.clone())).collect::<Vec<_>>();
|
||||
|
||||
Env { iter: result.into_iter() }
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
ENV.lock().unwrap().as_ref().unwrap().get(k).cloned()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
let (k, v) = (k.to_owned(), v.to_owned());
|
||||
ENV.lock().unwrap().as_mut().unwrap().insert(k, v);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(k: &OsStr) -> io::Result<()> {
|
||||
ENV.lock().unwrap().as_mut().unwrap().remove(k);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
PathBuf::from("/tmp")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,14 +1,11 @@
|
|||
use fortanix_sgx_abi::{Error, RESULT_SUCCESS};
|
||||
|
||||
use crate::collections::HashMap;
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::marker::PhantomData;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sync::atomic::{AtomicUsize, Ordering};
|
||||
use crate::sync::{Mutex, Once};
|
||||
use crate::sys::{decode_error_kind, sgx_ineffective, unsupported};
|
||||
use crate::{fmt, io, str, vec};
|
||||
use crate::{fmt, io, str};
|
||||
|
||||
pub fn errno() -> i32 {
|
||||
RESULT_SUCCESS
|
||||
|
|
@ -73,101 +70,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
// Specifying linkage/symbol name is solely to ensure a single instance between this crate and its unit tests
|
||||
#[cfg_attr(test, linkage = "available_externally")]
|
||||
#[unsafe(export_name = "_ZN16__rust_internals3std3sys3pal3sgx2os3ENVE")]
|
||||
static ENV: AtomicUsize = AtomicUsize::new(0);
|
||||
// Specifying linkage/symbol name is solely to ensure a single instance between this crate and its unit tests
|
||||
#[cfg_attr(test, linkage = "available_externally")]
|
||||
#[unsafe(export_name = "_ZN16__rust_internals3std3sys3pal3sgx2os8ENV_INITE")]
|
||||
static ENV_INIT: Once = Once::new();
|
||||
type EnvStore = Mutex<HashMap<OsString, OsString>>;
|
||||
|
||||
fn get_env_store() -> Option<&'static EnvStore> {
|
||||
unsafe { (ENV.load(Ordering::Relaxed) as *const EnvStore).as_ref() }
|
||||
}
|
||||
|
||||
fn create_env_store() -> &'static EnvStore {
|
||||
ENV_INIT.call_once(|| {
|
||||
ENV.store(Box::into_raw(Box::new(EnvStore::default())) as _, Ordering::Relaxed)
|
||||
});
|
||||
unsafe { &*(ENV.load(Ordering::Relaxed) as *const EnvStore) }
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { slice } = self;
|
||||
f.debug_list()
|
||||
.entries(slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { iter } = self;
|
||||
EnvStrDebug { slice: iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
f.debug_list().entries(iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
let clone_to_vec = |map: &HashMap<OsString, OsString>| -> Vec<_> {
|
||||
map.iter().map(|(k, v)| (k.clone(), v.clone())).collect()
|
||||
};
|
||||
|
||||
let iter = get_env_store()
|
||||
.map(|env| clone_to_vec(&env.lock().unwrap()))
|
||||
.unwrap_or_default()
|
||||
.into_iter();
|
||||
Env { iter }
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
get_env_store().and_then(|s| s.lock().unwrap().get(k).cloned())
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
let (k, v) = (k.to_owned(), v.to_owned());
|
||||
create_env_store().lock().unwrap().insert(k, v);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(k: &OsStr) -> io::Result<()> {
|
||||
if let Some(env) = get_env_store() {
|
||||
env.lock().unwrap().remove(k);
|
||||
}
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no filesystem in SGX")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,14 +1,8 @@
|
|||
use core::slice::memchr;
|
||||
|
||||
use super::{error, itron, unsupported};
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::os::raw::{c_char, c_int};
|
||||
use crate::os::solid::ffi::{OsStrExt, OsStringExt};
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sync::{PoisonError, RwLock};
|
||||
use crate::sys::common::small_c_string::run_with_cstr;
|
||||
use crate::{fmt, io, vec};
|
||||
use crate::{fmt, io};
|
||||
|
||||
// `solid` directly maps `errno`s to μITRON error codes.
|
||||
impl itron::error::ItronError {
|
||||
|
|
@ -75,138 +69,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
static ENV_LOCK: RwLock<()> = RwLock::new(());
|
||||
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
ENV_LOCK.read().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { slice } = self;
|
||||
f.debug_list()
|
||||
.entries(slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { iter } = self;
|
||||
EnvStrDebug { slice: iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
f.debug_list().entries(iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
|
||||
/// Returns a vector of (variable, value) byte-vector pairs for all the
|
||||
/// environment variables of the current process.
|
||||
pub fn env() -> Env {
|
||||
unsafe extern "C" {
|
||||
static mut environ: *const *const c_char;
|
||||
}
|
||||
|
||||
unsafe {
|
||||
let _guard = env_read_lock();
|
||||
let mut result = Vec::new();
|
||||
if !environ.is_null() {
|
||||
while !(*environ).is_null() {
|
||||
if let Some(key_value) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
result.push(key_value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
return Env { iter: result.into_iter() };
|
||||
}
|
||||
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
// Strategy (copied from glibc): Variable name and value are separated
|
||||
// by an ASCII equals sign '='. Since a variable name must not be
|
||||
// empty, allow variable names starting with an equals sign. Skip all
|
||||
// malformed lines.
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
// environment variables with a nul byte can't be set, so their value is
|
||||
// always None as well
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
let _guard = env_read_lock();
|
||||
let v = unsafe { libc::getenv(k.as_ptr()) } as *const libc::c_char;
|
||||
|
||||
if v.is_null() {
|
||||
Ok(None)
|
||||
} else {
|
||||
// SAFETY: `v` cannot be mutated while executing this line since we've a read lock
|
||||
let bytes = unsafe { CStr::from_ptr(v) }.to_bytes().to_vec();
|
||||
|
||||
Ok(Some(OsStringExt::from_vec(bytes)))
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
.flatten()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
run_with_cstr(v.as_bytes(), &|v| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt_env(unsafe { libc::setenv(k.as_ptr(), v.as_ptr(), 1) }).map(drop)
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(n.as_bytes(), &|nbuf| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt_env(unsafe { libc::unsetenv(nbuf.as_ptr()) }).map(drop)
|
||||
})
|
||||
}
|
||||
|
||||
/// In kmclib, `setenv` and `unsetenv` don't always set `errno`, so this
|
||||
/// function just returns a generic error.
|
||||
fn cvt_env(t: c_int) -> io::Result<c_int> {
|
||||
if t == -1 { Err(io::const_error!(io::ErrorKind::Uncategorized, "failure")) } else { Ok(t) }
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no standard temporary directory on this platform")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -73,47 +73,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
pub struct Env(!);
|
||||
|
||||
impl Env {
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, _: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
panic!("not supported on this platform")
|
||||
}
|
||||
|
||||
pub fn getenv(_: &OsStr) -> Option<OsString> {
|
||||
None
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(_: &OsStr, _: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot set env vars on this platform"))
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(_: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot unset env vars on this platform"))
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no filesystem on this platform")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -131,60 +131,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
helpers::device_path_to_text(protocol).map(PathBuf::from)
|
||||
}
|
||||
|
||||
pub struct EnvStrDebug<'a> {
|
||||
iter: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let mut list = f.debug_list();
|
||||
for (a, b) in self.iter {
|
||||
list.entry(&(a.to_str().unwrap(), b.to_str().unwrap()));
|
||||
}
|
||||
list.finish()
|
||||
}
|
||||
}
|
||||
|
||||
pub struct Env(crate::vec::IntoIter<(OsString, OsString)>);
|
||||
|
||||
impl Env {
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
EnvStrDebug { iter: self.0.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.0.next()
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
self.0.fmt(f)
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
let env = uefi_env::get_all().expect("not supported on this platform");
|
||||
Env(env.into_iter())
|
||||
}
|
||||
|
||||
pub fn getenv(key: &OsStr) -> Option<OsString> {
|
||||
uefi_env::get(key)
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(key: &OsStr, val: &OsStr) -> io::Result<()> {
|
||||
uefi_env::set(key, val)
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(key: &OsStr) -> io::Result<()> {
|
||||
uefi_env::unset(key)
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no filesystem on this platform")
|
||||
}
|
||||
|
|
@ -213,85 +159,3 @@ pub fn exit(code: i32) -> ! {
|
|||
pub fn getpid() -> u32 {
|
||||
panic!("no pids on this platform")
|
||||
}
|
||||
|
||||
mod uefi_env {
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::io;
|
||||
use crate::os::uefi::ffi::OsStringExt;
|
||||
use crate::ptr::NonNull;
|
||||
use crate::sys::{helpers, unsupported_err};
|
||||
|
||||
pub(crate) fn get(key: &OsStr) -> Option<OsString> {
|
||||
let shell = helpers::open_shell()?;
|
||||
let mut key_ptr = helpers::os_string_to_raw(key)?;
|
||||
unsafe { get_raw(shell, key_ptr.as_mut_ptr()) }
|
||||
}
|
||||
|
||||
pub(crate) fn set(key: &OsStr, val: &OsStr) -> io::Result<()> {
|
||||
let mut key_ptr = helpers::os_string_to_raw(key)
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid key"))?;
|
||||
let mut val_ptr = helpers::os_string_to_raw(val)
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid value"))?;
|
||||
unsafe { set_raw(key_ptr.as_mut_ptr(), val_ptr.as_mut_ptr()) }
|
||||
}
|
||||
|
||||
pub(crate) fn unset(key: &OsStr) -> io::Result<()> {
|
||||
let mut key_ptr = helpers::os_string_to_raw(key)
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid key"))?;
|
||||
unsafe { set_raw(key_ptr.as_mut_ptr(), crate::ptr::null_mut()) }
|
||||
}
|
||||
|
||||
pub(crate) fn get_all() -> io::Result<Vec<(OsString, OsString)>> {
|
||||
let shell = helpers::open_shell().ok_or(unsupported_err())?;
|
||||
|
||||
let mut vars = Vec::new();
|
||||
let val = unsafe { ((*shell.as_ptr()).get_env)(crate::ptr::null_mut()) };
|
||||
|
||||
if val.is_null() {
|
||||
return Ok(vars);
|
||||
}
|
||||
|
||||
let mut start = 0;
|
||||
|
||||
// UEFI Shell returns all keys separated by NULL.
|
||||
// End of string is denoted by two NULLs
|
||||
for i in 0.. {
|
||||
if unsafe { *val.add(i) } == 0 {
|
||||
// Two NULL signal end of string
|
||||
if i == start {
|
||||
break;
|
||||
}
|
||||
|
||||
let key = OsString::from_wide(unsafe {
|
||||
crate::slice::from_raw_parts(val.add(start), i - start)
|
||||
});
|
||||
// SAFETY: val.add(start) is always NULL terminated
|
||||
let val = unsafe { get_raw(shell, val.add(start)) }
|
||||
.ok_or(io::const_error!(io::ErrorKind::InvalidInput, "invalid value"))?;
|
||||
|
||||
vars.push((key, val));
|
||||
start = i + 1;
|
||||
}
|
||||
}
|
||||
|
||||
Ok(vars)
|
||||
}
|
||||
|
||||
unsafe fn get_raw(
|
||||
shell: NonNull<r_efi::efi::protocols::shell::Protocol>,
|
||||
key_ptr: *mut r_efi::efi::Char16,
|
||||
) -> Option<OsString> {
|
||||
let val = unsafe { ((*shell.as_ptr()).get_env)(key_ptr) };
|
||||
helpers::os_string_from_raw(val)
|
||||
}
|
||||
|
||||
unsafe fn set_raw(
|
||||
key_ptr: *mut r_efi::efi::Char16,
|
||||
val_ptr: *mut r_efi::efi::Char16,
|
||||
) -> io::Result<()> {
|
||||
let shell = helpers::open_shell().ok_or(unsupported_err())?;
|
||||
let r =
|
||||
unsafe { ((*shell.as_ptr()).set_env)(key_ptr, val_ptr, r_efi::efi::Boolean::FALSE) };
|
||||
if r.is_error() { Err(io::Error::from_raw_os_error(r.as_usize())) } else { Ok(()) }
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -5,20 +5,15 @@
|
|||
#[cfg(test)]
|
||||
mod tests;
|
||||
|
||||
use core::slice::memchr;
|
||||
|
||||
use libc::{c_char, c_int, c_void};
|
||||
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{CStr, CString, OsStr, OsString};
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::os::unix::prelude::*;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sync::{PoisonError, RwLock};
|
||||
use crate::sys::common::small_c_string::{run_path_with_cstr, run_with_cstr};
|
||||
#[cfg(all(target_env = "gnu", not(target_os = "vxworks")))]
|
||||
use crate::sys::weak::weak;
|
||||
use crate::sys::{cvt, fd};
|
||||
use crate::{fmt, io, iter, mem, ptr, slice, str, vec};
|
||||
use crate::sys::common::small_c_string::run_path_with_cstr;
|
||||
use crate::sys::cvt;
|
||||
use crate::{fmt, io, iter, mem, ptr, slice, str};
|
||||
|
||||
const TMPBUF_SZ: usize = 128;
|
||||
|
||||
|
|
@ -552,166 +547,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
if !path.is_absolute() { getcwd().map(|cwd| cwd.join(path)) } else { Ok(path) }
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { slice } = self;
|
||||
f.debug_list()
|
||||
.entries(slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { iter } = self;
|
||||
EnvStrDebug { slice: iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
f.debug_list().entries(iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
|
||||
// Use `_NSGetEnviron` on Apple platforms.
|
||||
//
|
||||
// `_NSGetEnviron` is the documented alternative (see `man environ`), and has
|
||||
// been available since the first versions of both macOS and iOS.
|
||||
//
|
||||
// Nowadays, specifically since macOS 10.8, `environ` has been exposed through
|
||||
// `libdyld.dylib`, which is linked via. `libSystem.dylib`:
|
||||
// <https://github.com/apple-oss-distributions/dyld/blob/dyld-1160.6/libdyld/libdyldGlue.cpp#L913>
|
||||
//
|
||||
// So in the end, it likely doesn't really matter which option we use, but the
|
||||
// performance cost of using `_NSGetEnviron` is extremely miniscule, and it
|
||||
// might be ever so slightly more supported, so let's just use that.
|
||||
//
|
||||
// NOTE: The header where this is defined (`crt_externs.h`) was added to the
|
||||
// iOS 13.0 SDK, which has been the source of a great deal of confusion in the
|
||||
// past about the availability of this API.
|
||||
//
|
||||
// NOTE(madsmtm): Neither this nor using `environ` has been verified to not
|
||||
// cause App Store rejections; if this is found to be the case, an alternative
|
||||
// implementation of this is possible using `[NSProcessInfo environment]`
|
||||
// - which internally uses `_NSGetEnviron` and a system-wide lock on the
|
||||
// environment variables to protect against `setenv`, so using that might be
|
||||
// desirable anyhow? Though it also means that we have to link to Foundation.
|
||||
#[cfg(target_vendor = "apple")]
|
||||
pub unsafe fn environ() -> *mut *const *const c_char {
|
||||
libc::_NSGetEnviron() as *mut *const *const c_char
|
||||
}
|
||||
|
||||
// Use the `environ` static which is part of POSIX.
|
||||
#[cfg(not(target_vendor = "apple"))]
|
||||
pub unsafe fn environ() -> *mut *const *const c_char {
|
||||
unsafe extern "C" {
|
||||
static mut environ: *const *const c_char;
|
||||
}
|
||||
&raw mut environ
|
||||
}
|
||||
|
||||
static ENV_LOCK: RwLock<()> = RwLock::new(());
|
||||
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
ENV_LOCK.read().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
|
||||
/// Returns a vector of (variable, value) byte-vector pairs for all the
|
||||
/// environment variables of the current process.
|
||||
pub fn env() -> Env {
|
||||
unsafe {
|
||||
let _guard = env_read_lock();
|
||||
let mut environ = *environ();
|
||||
let mut result = Vec::new();
|
||||
if !environ.is_null() {
|
||||
while !(*environ).is_null() {
|
||||
if let Some(key_value) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
result.push(key_value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
return Env { iter: result.into_iter() };
|
||||
}
|
||||
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
// Strategy (copied from glibc): Variable name and value are separated
|
||||
// by an ASCII equals sign '='. Since a variable name must not be
|
||||
// empty, allow variable names starting with an equals sign. Skip all
|
||||
// malformed lines.
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
// environment variables with a nul byte can't be set, so their value is
|
||||
// always None as well
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
let _guard = env_read_lock();
|
||||
let v = unsafe { libc::getenv(k.as_ptr()) } as *const libc::c_char;
|
||||
|
||||
if v.is_null() {
|
||||
Ok(None)
|
||||
} else {
|
||||
// SAFETY: `v` cannot be mutated while executing this line since we've a read lock
|
||||
let bytes = unsafe { CStr::from_ptr(v) }.to_bytes().to_vec();
|
||||
|
||||
Ok(Some(OsStringExt::from_vec(bytes)))
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
.flatten()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
run_with_cstr(v.as_bytes(), &|v| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt(libc::setenv(k.as_ptr(), v.as_ptr(), 1)).map(drop)
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(n.as_bytes(), &|nbuf| {
|
||||
let _guard = ENV_LOCK.write();
|
||||
cvt(libc::unsetenv(nbuf.as_ptr())).map(drop)
|
||||
})
|
||||
}
|
||||
|
||||
#[cfg(not(target_os = "espidf"))]
|
||||
pub fn page_size() -> usize {
|
||||
unsafe { libc::sysconf(libc::_SC_PAGESIZE) as usize }
|
||||
|
|
|
|||
|
|
@ -62,47 +62,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
pub struct Env(!);
|
||||
|
||||
impl Env {
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, _: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
panic!("not supported on this platform")
|
||||
}
|
||||
|
||||
pub fn getenv(_: &OsStr) -> Option<OsString> {
|
||||
None
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(_: &OsStr, _: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot set env vars on this platform"))
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(_: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot unset env vars on this platform"))
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no filesystem on this platform")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,19 +1,16 @@
|
|||
#![forbid(unsafe_op_in_unsafe_fn)]
|
||||
|
||||
use core::slice::memchr;
|
||||
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{CStr, OsStr, OsString};
|
||||
use crate::marker::PhantomData;
|
||||
use crate::ops::Drop;
|
||||
use crate::os::wasi::prelude::*;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sys::common::small_c_string::{run_path_with_cstr, run_with_cstr};
|
||||
use crate::sys::common::small_c_string::run_path_with_cstr;
|
||||
use crate::sys::unsupported;
|
||||
use crate::{fmt, io, str, vec};
|
||||
use crate::{fmt, io, str};
|
||||
|
||||
// Add a few symbols not in upstream `libc` just yet.
|
||||
mod libc {
|
||||
pub mod libc {
|
||||
pub use libc::*;
|
||||
|
||||
unsafe extern "C" {
|
||||
|
|
@ -23,28 +20,6 @@ mod libc {
|
|||
}
|
||||
}
|
||||
|
||||
cfg_if::cfg_if! {
|
||||
if #[cfg(target_feature = "atomics")] {
|
||||
// Access to the environment must be protected by a lock in multi-threaded scenarios.
|
||||
use crate::sync::{PoisonError, RwLock};
|
||||
static ENV_LOCK: RwLock<()> = RwLock::new(());
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
ENV_LOCK.read().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
pub fn env_write_lock() -> impl Drop {
|
||||
ENV_LOCK.write().unwrap_or_else(PoisonError::into_inner)
|
||||
}
|
||||
} else {
|
||||
// No need for a lock if we are single-threaded.
|
||||
pub fn env_read_lock() -> impl Drop {
|
||||
Box::new(())
|
||||
}
|
||||
pub fn env_write_lock() -> impl Drop {
|
||||
Box::new(())
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn errno() -> i32 {
|
||||
unsafe extern "C" {
|
||||
#[thread_local]
|
||||
|
|
@ -141,123 +116,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { slice } = self;
|
||||
f.debug_list()
|
||||
.entries(slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { iter } = self;
|
||||
EnvStrDebug { slice: iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
f.debug_list().entries(iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
unsafe {
|
||||
let _guard = env_read_lock();
|
||||
|
||||
// Use `__wasilibc_get_environ` instead of `environ` here so that we
|
||||
// don't require wasi-libc to eagerly initialize the environment
|
||||
// variables.
|
||||
let mut environ = libc::__wasilibc_get_environ();
|
||||
|
||||
let mut result = Vec::new();
|
||||
if !environ.is_null() {
|
||||
while !(*environ).is_null() {
|
||||
if let Some(key_value) = parse(CStr::from_ptr(*environ).to_bytes()) {
|
||||
result.push(key_value);
|
||||
}
|
||||
environ = environ.add(1);
|
||||
}
|
||||
}
|
||||
return Env { iter: result.into_iter() };
|
||||
}
|
||||
|
||||
// See src/libstd/sys/pal/unix/os.rs, same as that
|
||||
fn parse(input: &[u8]) -> Option<(OsString, OsString)> {
|
||||
if input.is_empty() {
|
||||
return None;
|
||||
}
|
||||
let pos = memchr::memchr(b'=', &input[1..]).map(|p| p + 1);
|
||||
pos.map(|p| {
|
||||
(
|
||||
OsStringExt::from_vec(input[..p].to_vec()),
|
||||
OsStringExt::from_vec(input[p + 1..].to_vec()),
|
||||
)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
// environment variables with a nul byte can't be set, so their value is
|
||||
// always None as well
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
let _guard = env_read_lock();
|
||||
let v = unsafe { libc::getenv(k.as_ptr()) } as *const libc::c_char;
|
||||
|
||||
if v.is_null() {
|
||||
Ok(None)
|
||||
} else {
|
||||
// SAFETY: `v` cannot be mutated while executing this line since we've a read lock
|
||||
let bytes = unsafe { CStr::from_ptr(v) }.to_bytes().to_vec();
|
||||
|
||||
Ok(Some(OsStringExt::from_vec(bytes)))
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
.flatten()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(k.as_bytes(), &|k| {
|
||||
run_with_cstr(v.as_bytes(), &|v| unsafe {
|
||||
let _guard = env_write_lock();
|
||||
cvt(libc::setenv(k.as_ptr(), v.as_ptr(), 1)).map(drop)
|
||||
})
|
||||
})
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
run_with_cstr(n.as_bytes(), &|nbuf| unsafe {
|
||||
let _guard = env_write_lock();
|
||||
cvt(libc::unsetenv(nbuf.as_ptr())).map(drop)
|
||||
})
|
||||
}
|
||||
|
||||
#[allow(dead_code)]
|
||||
pub fn page_size() -> usize {
|
||||
unsafe { libc::sysconf(libc::_SC_PAGESIZE) as usize }
|
||||
|
|
@ -294,6 +152,6 @@ macro_rules! impl_is_minus_one {
|
|||
|
||||
impl_is_minus_one! { i8 i16 i32 i64 isize }
|
||||
|
||||
fn cvt<T: IsMinusOne>(t: T) -> io::Result<T> {
|
||||
pub fn cvt<T: IsMinusOne>(t: T) -> io::Result<T> {
|
||||
if t.is_minus_one() { Err(io::Error::last_os_error()) } else { Ok(t) }
|
||||
}
|
||||
|
|
|
|||
|
|
@ -5,16 +5,16 @@
|
|||
#[cfg(test)]
|
||||
mod tests;
|
||||
|
||||
use super::api;
|
||||
#[cfg(not(target_vendor = "uwp"))]
|
||||
use super::api::WinError;
|
||||
use super::{api, to_u16s};
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::os::windows::ffi::EncodeWide;
|
||||
use crate::os::windows::prelude::*;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sys::{c, cvt};
|
||||
use crate::{fmt, io, ptr, slice};
|
||||
use crate::sys::pal::{c, cvt};
|
||||
use crate::{fmt, io, ptr};
|
||||
|
||||
pub fn errno() -> i32 {
|
||||
api::get_last_error().code as i32
|
||||
|
|
@ -76,108 +76,6 @@ pub fn error_string(mut errnum: i32) -> String {
|
|||
}
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
base: *mut c::WCHAR,
|
||||
iter: EnvIterator,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
iter: &'a EnvIterator,
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
let iter: EnvIterator = (*iter).clone();
|
||||
let mut list = f.debug_list();
|
||||
for (a, b) in iter {
|
||||
list.entry(&(a.to_str().unwrap(), b.to_str().unwrap()));
|
||||
}
|
||||
list.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { base: _, iter } = self;
|
||||
EnvStrDebug { iter }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { base: _, iter } = self;
|
||||
f.debug_list().entries(iter.clone()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
let Self { base: _, iter } = self;
|
||||
iter.next()
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
struct EnvIterator(*mut c::WCHAR);
|
||||
|
||||
impl Iterator for EnvIterator {
|
||||
type Item = (OsString, OsString);
|
||||
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
let Self(cur) = self;
|
||||
loop {
|
||||
unsafe {
|
||||
if **cur == 0 {
|
||||
return None;
|
||||
}
|
||||
let p = *cur as *const u16;
|
||||
let mut len = 0;
|
||||
while *p.add(len) != 0 {
|
||||
len += 1;
|
||||
}
|
||||
let s = slice::from_raw_parts(p, len);
|
||||
*cur = cur.add(len + 1);
|
||||
|
||||
// Windows allows environment variables to start with an equals
|
||||
// symbol (in any other position, this is the separator between
|
||||
// variable name and value). Since`s` has at least length 1 at
|
||||
// this point (because the empty string terminates the array of
|
||||
// environment variables), we can safely slice.
|
||||
let pos = match s[1..].iter().position(|&u| u == b'=' as u16).map(|p| p + 1) {
|
||||
Some(p) => p,
|
||||
None => continue,
|
||||
};
|
||||
return Some((
|
||||
OsStringExt::from_wide(&s[..pos]),
|
||||
OsStringExt::from_wide(&s[pos + 1..]),
|
||||
));
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl Drop for Env {
|
||||
fn drop(&mut self) {
|
||||
unsafe {
|
||||
c::FreeEnvironmentStringsW(self.base);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
unsafe {
|
||||
let ch = c::GetEnvironmentStringsW();
|
||||
if ch.is_null() {
|
||||
panic!("failure getting env string from OS: {}", io::Error::last_os_error());
|
||||
}
|
||||
Env { base: ch, iter: EnvIterator(ch) }
|
||||
}
|
||||
}
|
||||
|
||||
pub struct SplitPaths<'a> {
|
||||
data: EncodeWide<'a>,
|
||||
must_yield: bool,
|
||||
|
|
@ -290,33 +188,6 @@ pub fn chdir(p: &path::Path) -> io::Result<()> {
|
|||
cvt(unsafe { c::SetCurrentDirectoryW(p.as_ptr()) }).map(drop)
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
let k = to_u16s(k).ok()?;
|
||||
super::fill_utf16_buf(
|
||||
|buf, sz| unsafe { c::GetEnvironmentVariableW(k.as_ptr(), buf, sz) },
|
||||
OsStringExt::from_wide,
|
||||
)
|
||||
.ok()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
// SAFETY: We ensure that k and v are null-terminated wide strings.
|
||||
unsafe {
|
||||
let k = to_u16s(k)?;
|
||||
let v = to_u16s(v)?;
|
||||
|
||||
cvt(c::SetEnvironmentVariableW(k.as_ptr(), v.as_ptr())).map(drop)
|
||||
}
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(n: &OsStr) -> io::Result<()> {
|
||||
// SAFETY: We ensure that v is a null-terminated wide strings.
|
||||
unsafe {
|
||||
let v = to_u16s(n)?;
|
||||
cvt(c::SetEnvironmentVariableW(v.as_ptr(), ptr::null())).map(drop)
|
||||
}
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
super::fill_utf16_buf(|buf, sz| unsafe { c::GetTempPath2W(sz, buf) }, super::os2path).unwrap()
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,13 +1,11 @@
|
|||
use super::unsupported;
|
||||
use crate::collections::HashMap;
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::marker::PhantomData;
|
||||
use crate::os::xous::ffi::Error as XousError;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sync::atomic::{AtomicPtr, AtomicUsize, Ordering};
|
||||
use crate::sync::{Mutex, Once};
|
||||
use crate::{fmt, io, vec};
|
||||
use crate::sync::atomic::{AtomicPtr, Ordering};
|
||||
use crate::{fmt, io};
|
||||
|
||||
pub(crate) mod params;
|
||||
|
||||
|
|
@ -136,100 +134,6 @@ pub(crate) fn get_application_parameters() -> Option<params::ApplicationParamete
|
|||
unsafe { params::ApplicationParameters::new_from_ptr(params_address) }
|
||||
}
|
||||
|
||||
// ---------- Environment handling ---------- //
|
||||
static ENV: AtomicUsize = AtomicUsize::new(0);
|
||||
static ENV_INIT: Once = Once::new();
|
||||
type EnvStore = Mutex<HashMap<OsString, OsString>>;
|
||||
|
||||
fn get_env_store() -> &'static EnvStore {
|
||||
ENV_INIT.call_once(|| {
|
||||
let env_store = EnvStore::default();
|
||||
if let Some(params) = get_application_parameters() {
|
||||
for param in params {
|
||||
if let Ok(envs) = params::EnvironmentBlock::try_from(¶m) {
|
||||
let mut env_store = env_store.lock().unwrap();
|
||||
for env in envs {
|
||||
env_store.insert(env.key.into(), env.value.into());
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
ENV.store(Box::into_raw(Box::new(env_store)) as _, Ordering::Relaxed)
|
||||
});
|
||||
unsafe { &*core::ptr::with_exposed_provenance::<EnvStore>(ENV.load(Ordering::Relaxed)) }
|
||||
}
|
||||
|
||||
pub struct Env {
|
||||
iter: vec::IntoIter<(OsString, OsString)>,
|
||||
}
|
||||
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub struct EnvStrDebug<'a> {
|
||||
slice: &'a [(OsString, OsString)],
|
||||
}
|
||||
|
||||
impl fmt::Debug for EnvStrDebug<'_> {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { slice } = self;
|
||||
f.debug_list()
|
||||
.entries(slice.iter().map(|(a, b)| (a.to_str().unwrap(), b.to_str().unwrap())))
|
||||
.finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl Env {
|
||||
// FIXME(https://github.com/rust-lang/rust/issues/114583): Remove this when <OsStr as Debug>::fmt matches <str as Debug>::fmt.
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self { iter } = self;
|
||||
EnvStrDebug { slice: iter.as_slice() }
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self { iter } = self;
|
||||
f.debug_list().entries(iter.as_slice()).finish()
|
||||
}
|
||||
}
|
||||
|
||||
impl !Send for Env {}
|
||||
impl !Sync for Env {}
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.iter.next()
|
||||
}
|
||||
fn size_hint(&self) -> (usize, Option<usize>) {
|
||||
self.iter.size_hint()
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
let clone_to_vec = |map: &HashMap<OsString, OsString>| -> Vec<_> {
|
||||
map.iter().map(|(k, v)| (k.clone(), v.clone())).collect()
|
||||
};
|
||||
|
||||
let iter = clone_to_vec(&*get_env_store().lock().unwrap()).into_iter();
|
||||
Env { iter }
|
||||
}
|
||||
|
||||
pub fn getenv(k: &OsStr) -> Option<OsString> {
|
||||
get_env_store().lock().unwrap().get(k).cloned()
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(k: &OsStr, v: &OsStr) -> io::Result<()> {
|
||||
let (k, v) = (k.to_owned(), v.to_owned());
|
||||
get_env_store().lock().unwrap().insert(k, v);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(k: &OsStr) -> io::Result<()> {
|
||||
get_env_store().lock().unwrap().remove(k);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no filesystem on this platform")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,10 +1,8 @@
|
|||
use super::{WORD_SIZE, abi, unsupported};
|
||||
use super::unsupported;
|
||||
use crate::error::Error as StdError;
|
||||
use crate::ffi::{OsStr, OsString};
|
||||
use crate::marker::PhantomData;
|
||||
use crate::path::{self, PathBuf};
|
||||
use crate::sys::os_str;
|
||||
use crate::sys_common::FromInner;
|
||||
use crate::{fmt, io};
|
||||
|
||||
pub fn errno() -> i32 {
|
||||
|
|
@ -64,64 +62,6 @@ pub fn current_exe() -> io::Result<PathBuf> {
|
|||
unsupported()
|
||||
}
|
||||
|
||||
pub struct Env(!);
|
||||
|
||||
impl Iterator for Env {
|
||||
type Item = (OsString, OsString);
|
||||
fn next(&mut self) -> Option<(OsString, OsString)> {
|
||||
self.0
|
||||
}
|
||||
}
|
||||
|
||||
pub fn env() -> Env {
|
||||
panic!("not supported on this platform")
|
||||
}
|
||||
|
||||
impl Env {
|
||||
pub fn str_debug(&self) -> impl fmt::Debug + '_ {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
impl fmt::Debug for Env {
|
||||
fn fmt(&self, _: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
let Self(inner) = self;
|
||||
match *inner {}
|
||||
}
|
||||
}
|
||||
|
||||
pub fn getenv(varname: &OsStr) -> Option<OsString> {
|
||||
let varname = varname.as_encoded_bytes();
|
||||
let nbytes =
|
||||
unsafe { abi::sys_getenv(crate::ptr::null_mut(), 0, varname.as_ptr(), varname.len()) };
|
||||
if nbytes == usize::MAX {
|
||||
return None;
|
||||
}
|
||||
|
||||
let nwords = (nbytes + WORD_SIZE - 1) / WORD_SIZE;
|
||||
let words = unsafe { abi::sys_alloc_words(nwords) };
|
||||
|
||||
let nbytes2 = unsafe { abi::sys_getenv(words, nwords, varname.as_ptr(), varname.len()) };
|
||||
debug_assert_eq!(nbytes, nbytes2);
|
||||
|
||||
// Convert to OsString.
|
||||
//
|
||||
// FIXME: We can probably get rid of the extra copy here if we
|
||||
// reimplement "os_str" instead of just using the generic unix
|
||||
// "os_str".
|
||||
let u8s: &[u8] = unsafe { crate::slice::from_raw_parts(words.cast() as *const u8, nbytes) };
|
||||
Some(OsString::from_inner(os_str::Buf { inner: u8s.to_vec() }))
|
||||
}
|
||||
|
||||
pub unsafe fn setenv(_: &OsStr, _: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot set env vars on this platform"))
|
||||
}
|
||||
|
||||
pub unsafe fn unsetenv(_: &OsStr) -> io::Result<()> {
|
||||
Err(io::const_error!(io::ErrorKind::Unsupported, "cannot unset env vars on this platform"))
|
||||
}
|
||||
|
||||
pub fn temp_dir() -> PathBuf {
|
||||
panic!("no filesystem on this platform")
|
||||
}
|
||||
|
|
|
|||
|
|
@ -88,7 +88,7 @@ impl Command {
|
|||
// in its own process. Thus the parent drops the lock guard immediately.
|
||||
// The child calls `mem::forget` to leak the lock, which is crucial because
|
||||
// releasing a lock is not async-signal-safe.
|
||||
let env_lock = sys::os::env_read_lock();
|
||||
let env_lock = sys::env::env_read_lock();
|
||||
let pid = unsafe { self.do_fork()? };
|
||||
|
||||
if pid == 0 {
|
||||
|
|
@ -237,7 +237,7 @@ impl Command {
|
|||
// Similar to when forking, we want to ensure that access to
|
||||
// the environment is synchronized, so make sure to grab the
|
||||
// environment lock before we try to exec.
|
||||
let _lock = sys::os::env_read_lock();
|
||||
let _lock = sys::env::env_read_lock();
|
||||
|
||||
let Err(e) = self.do_exec(theirs, envp.as_ref());
|
||||
e
|
||||
|
|
@ -386,13 +386,13 @@ impl Command {
|
|||
impl Drop for Reset {
|
||||
fn drop(&mut self) {
|
||||
unsafe {
|
||||
*sys::os::environ() = self.0;
|
||||
*sys::env::environ() = self.0;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
_reset = Some(Reset(*sys::os::environ()));
|
||||
*sys::os::environ() = envp.as_ptr();
|
||||
_reset = Some(Reset(*sys::env::environ()));
|
||||
*sys::env::environ() = envp.as_ptr();
|
||||
}
|
||||
|
||||
libc::execvp(self.get_program_cstr().as_ptr(), self.get_argv().as_ptr());
|
||||
|
|
@ -739,8 +739,8 @@ impl Command {
|
|||
cvt_nz(libc::posix_spawnattr_setflags(attrs.0.as_mut_ptr(), flags as _))?;
|
||||
|
||||
// Make sure we synchronize access to the global `environ` resource
|
||||
let _env_lock = sys::os::env_read_lock();
|
||||
let envp = envp.map(|c| c.as_ptr()).unwrap_or_else(|| *sys::os::environ() as *const _);
|
||||
let _env_lock = sys::env::env_read_lock();
|
||||
let envp = envp.map(|c| c.as_ptr()).unwrap_or_else(|| *sys::env::environ() as *const _);
|
||||
|
||||
#[cfg(not(target_os = "nto"))]
|
||||
let spawn_fn = libc::posix_spawnp;
|
||||
|
|
|
|||
|
|
@ -67,7 +67,7 @@ impl Command {
|
|||
let c_envp = envp
|
||||
.as_ref()
|
||||
.map(|c| c.as_ptr())
|
||||
.unwrap_or_else(|| *sys::os::environ() as *const _);
|
||||
.unwrap_or_else(|| *sys::env::environ() as *const _);
|
||||
let stack_size = crate::cmp::max(
|
||||
crate::env::var_os("RUST_MIN_STACK")
|
||||
.and_then(|s| s.to_str().and_then(|s| s.parse().ok()))
|
||||
|
|
@ -76,7 +76,7 @@ impl Command {
|
|||
);
|
||||
|
||||
// ensure that access to the environment is synchronized
|
||||
let _lock = sys::os::env_read_lock();
|
||||
let _lock = sys::env::env_read_lock();
|
||||
|
||||
let ret = libc::rtpSpawn(
|
||||
self.get_program_cstr().as_ptr(),
|
||||
|
|
|
|||
|
|
@ -421,13 +421,13 @@ impl Step for Rustc {
|
|||
builder.install(&rustdoc, &image.join("bin"), FileType::Executable);
|
||||
}
|
||||
|
||||
let ra_proc_macro_srv_compiler =
|
||||
builder.compiler_for(compiler.stage, builder.config.build, compiler.host);
|
||||
builder.ensure(compile::Rustc::new(ra_proc_macro_srv_compiler, compiler.host));
|
||||
|
||||
if let Some(ra_proc_macro_srv) = builder.ensure_if_default(
|
||||
tool::RustAnalyzerProcMacroSrv {
|
||||
compiler: builder.compiler_for(
|
||||
compiler.stage,
|
||||
builder.config.build,
|
||||
compiler.host,
|
||||
),
|
||||
compiler: ra_proc_macro_srv_compiler,
|
||||
target: compiler.host,
|
||||
},
|
||||
builder.kind,
|
||||
|
|
@ -1178,6 +1178,8 @@ impl Step for Cargo {
|
|||
let compiler = self.compiler;
|
||||
let target = self.target;
|
||||
|
||||
builder.ensure(compile::Rustc::new(compiler, target));
|
||||
|
||||
let cargo = builder.ensure(tool::Cargo { compiler, target });
|
||||
let src = builder.src.join("src/tools/cargo");
|
||||
let etc = src.join("src/etc");
|
||||
|
|
@ -1232,6 +1234,8 @@ impl Step for RustAnalyzer {
|
|||
let compiler = self.compiler;
|
||||
let target = self.target;
|
||||
|
||||
builder.ensure(compile::Rustc::new(compiler, target));
|
||||
|
||||
let rust_analyzer = builder.ensure(tool::RustAnalyzer { compiler, target });
|
||||
|
||||
let mut tarball = Tarball::new(builder, "rust-analyzer", &target.triple);
|
||||
|
|
@ -1274,6 +1278,8 @@ impl Step for Clippy {
|
|||
let compiler = self.compiler;
|
||||
let target = self.target;
|
||||
|
||||
builder.ensure(compile::Rustc::new(compiler, target));
|
||||
|
||||
// Prepare the image directory
|
||||
// We expect clippy to build, because we've exited this step above if tool
|
||||
// state for clippy isn't testing.
|
||||
|
|
@ -1324,9 +1330,12 @@ impl Step for Miri {
|
|||
if !builder.build.unstable_features() {
|
||||
return None;
|
||||
}
|
||||
|
||||
let compiler = self.compiler;
|
||||
let target = self.target;
|
||||
|
||||
builder.ensure(compile::Rustc::new(compiler, target));
|
||||
|
||||
let miri = builder.ensure(tool::Miri { compiler, target });
|
||||
let cargomiri = builder.ensure(tool::CargoMiri { compiler, target });
|
||||
|
||||
|
|
@ -1463,6 +1472,8 @@ impl Step for Rustfmt {
|
|||
let compiler = self.compiler;
|
||||
let target = self.target;
|
||||
|
||||
builder.ensure(compile::Rustc::new(compiler, target));
|
||||
|
||||
let rustfmt = builder.ensure(tool::Rustfmt { compiler, target });
|
||||
let cargofmt = builder.ensure(tool::Cargofmt { compiler, target });
|
||||
let mut tarball = Tarball::new(builder, "rustfmt", &target.triple);
|
||||
|
|
@ -2328,6 +2339,8 @@ impl Step for LlvmBitcodeLinker {
|
|||
let compiler = self.compiler;
|
||||
let target = self.target;
|
||||
|
||||
builder.ensure(compile::Rustc::new(compiler, target));
|
||||
|
||||
let llbc_linker =
|
||||
builder.ensure(tool::LlvmBitcodeLinker { compiler, target, extra_features: vec![] });
|
||||
|
||||
|
|
|
|||
|
|
@ -449,6 +449,7 @@ mod dist {
|
|||
use pretty_assertions::assert_eq;
|
||||
|
||||
use super::{Config, TEST_TRIPLE_1, TEST_TRIPLE_2, TEST_TRIPLE_3, first, run_build};
|
||||
use crate::Flags;
|
||||
use crate::core::builder::*;
|
||||
|
||||
fn configure(host: &[&str], target: &[&str]) -> Config {
|
||||
|
|
@ -687,6 +688,37 @@ mod dist {
|
|||
);
|
||||
}
|
||||
|
||||
/// This also serves as an important regression test for <https://github.com/rust-lang/rust/issues/138123>
|
||||
/// and <https://github.com/rust-lang/rust/issues/138004>.
|
||||
#[test]
|
||||
fn dist_all_cross() {
|
||||
let cmd_args =
|
||||
&["dist", "--stage", "2", "--dry-run", "--config=/does/not/exist"].map(str::to_owned);
|
||||
let config_str = r#"
|
||||
[rust]
|
||||
channel = "nightly"
|
||||
|
||||
[build]
|
||||
extended = true
|
||||
|
||||
build = "i686-unknown-haiku"
|
||||
host = ["i686-unknown-netbsd"]
|
||||
target = ["i686-unknown-netbsd"]
|
||||
"#;
|
||||
let config = Config::parse_inner(Flags::parse(cmd_args), |&_| toml::from_str(config_str));
|
||||
let mut cache = run_build(&[], config);
|
||||
|
||||
// Stage 2 `compile::Rustc` should **NEVER** be cached here.
|
||||
assert_eq!(
|
||||
first(cache.all::<compile::Rustc>()),
|
||||
&[
|
||||
rustc!(TEST_TRIPLE_1 => TEST_TRIPLE_1, stage = 0),
|
||||
rustc!(TEST_TRIPLE_1 => TEST_TRIPLE_1, stage = 1),
|
||||
rustc!(TEST_TRIPLE_1 => TEST_TRIPLE_3, stage = 1),
|
||||
]
|
||||
);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn build_all() {
|
||||
let build = Build::new(configure(
|
||||
|
|
|
|||
|
|
@ -2,7 +2,10 @@
|
|||
|
||||
The tracking issue for this feature is: [#29599]
|
||||
|
||||
This feature is deprecated, to be replaced by [`macro_metavar_expr_concat`].
|
||||
|
||||
[#29599]: https://github.com/rust-lang/rust/issues/29599
|
||||
[`macro_metavar_expr_concat`]: https://github.com/rust-lang/rust/issues/124225
|
||||
|
||||
------------------------
|
||||
|
||||
|
|
|
|||
|
|
@ -18,13 +18,16 @@ LL | where
|
|||
LL | T: AsExpression<Self::SqlType>,
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ required by this bound in `Foo::check`
|
||||
|
||||
error[E0271]: type mismatch resolving `Integer == Text`
|
||||
error[E0277]: the trait bound `&str: AsExpression<Integer>` is not satisfied
|
||||
--> $DIR/as_expression.rs:56:5
|
||||
|
|
||||
LL | SelectInt.check("bar");
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^ types differ
|
||||
| ^^^^^^^^^^^^^^^^^^^^^^ the trait `AsExpression<Integer>` is not implemented for `&str`
|
||||
|
|
||||
= help: the trait `AsExpression<Integer>` is not implemented for `&str`
|
||||
but trait `AsExpression<Text>` is implemented for it
|
||||
= help: for that trait implementation, expected `Text`, found `Integer`
|
||||
|
||||
error: aborting due to 2 previous errors
|
||||
|
||||
Some errors have detailed explanations: E0271, E0277.
|
||||
For more information about an error, try `rustc --explain E0271`.
|
||||
For more information about this error, try `rustc --explain E0277`.
|
||||
|
|
|
|||
|
|
@ -55,5 +55,5 @@ impl<T> Foo for T where T: Expression {}
|
|||
fn main() {
|
||||
SelectInt.check("bar");
|
||||
//~^ ERROR the trait bound `&str: AsExpression<Integer>` is not satisfied
|
||||
//[next]~| ERROR type mismatch
|
||||
//[next]~| ERROR the trait bound `&str: AsExpression<Integer>` is not satisfied
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,3 +1,5 @@
|
|||
#![expect(deprecated)] // concat_idents is deprecated
|
||||
|
||||
const XY_1: i32 = 10;
|
||||
|
||||
fn main() {
|
||||
|
|
|
|||
|
|
@ -1,5 +1,5 @@
|
|||
error[E0658]: use of unstable library feature `concat_idents`: `concat_idents` is not stable enough for use and is subject to change
|
||||
--> $DIR/feature-gate-concat_idents.rs:5:13
|
||||
--> $DIR/feature-gate-concat_idents.rs:7:13
|
||||
|
|
||||
LL | let a = concat_idents!(X, Y_1);
|
||||
| ^^^^^^^^^^^^^
|
||||
|
|
@ -9,7 +9,7 @@ LL | let a = concat_idents!(X, Y_1);
|
|||
= note: this compiler was built on YYYY-MM-DD; consider upgrading it if it is out of date
|
||||
|
||||
error[E0658]: use of unstable library feature `concat_idents`: `concat_idents` is not stable enough for use and is subject to change
|
||||
--> $DIR/feature-gate-concat_idents.rs:6:13
|
||||
--> $DIR/feature-gate-concat_idents.rs:8:13
|
||||
|
|
||||
LL | let b = concat_idents!(X, Y_2);
|
||||
| ^^^^^^^^^^^^^
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue