which-6.0.3/.cargo_vcs_info.json0000644000000001360000000000100121440ustar { "git": { "sha1": "efd571d4b5baf4a5a44f4f2c42c04ce32050c13e" }, "path_in_vcs": "" }which-6.0.3/.github/workflows/rust.yml000064400000000000000000000050340072674642500161030ustar 00000000000000name: Main workflow on: push: pull_request: jobs: # Run the `rustfmt` code formatter rustfmt: name: Rustfmt [Formatter] runs-on: ubuntu-latest steps: - name: Setup | Checkout uses: actions/checkout@v4 - name: Setup | Rust uses: actions-rust-lang/setup-rust-toolchain@v1 with: toolchain: stable components: rustfmt - name: Build | Format run: cargo fmt --all -- --check # Run the `clippy` linting tool clippy: name: Clippy [Linter] strategy: matrix: os: [ubuntu-latest, windows-latest, macos-latest] runs-on: ${{ matrix.os }} steps: - name: Setup | Checkout uses: actions/checkout@v4 - name: Setup | Rust uses: actions-rust-lang/setup-rust-toolchain@v1 with: toolchain: stable components: clippy - name: Build | Lint run: cargo clippy --workspace --all-targets --all-features -- -Dwarnings - name: Build | Lint (no features) run: cargo clippy --workspace --all-targets -- -Dwarnings # Ensure that the project could be successfully compiled cargo_check: name: Compile strategy: matrix: target: [x86_64-unknown-linux-musl, wasm32-wasi] runs-on: ubuntu-latest steps: - name: Setup | Checkout uses: actions/checkout@v4 - name: Setup | Rust uses: actions-rust-lang/setup-rust-toolchain@v1 with: toolchain: stable target: ${{ matrix.target }} - name: Build | Check run: cargo check --workspace --target ${{ matrix.target }} # Run tests on Linux, macOS, and Windows # On both Rust stable and Rust nightly test: name: Test Suite runs-on: ${{ matrix.os }} needs: cargo_check # First check then run expansive tests strategy: fail-fast: false matrix: os: [ubuntu-latest, windows-latest, macos-latest] rust: ['1.70', stable, nightly] steps: - name: Setup | Checkout uses: actions/checkout@v4 - name: Setup | Rust uses: actions-rust-lang/setup-rust-toolchain@v1 with: toolchain: ${{ matrix.rust }} # Run the ignored tests that expect the above setup - name: Build | Test run: cargo test --workspace --all-features -- --include-ignored cargo-deny: runs-on: ubuntu-22.04 steps: - uses: actions/checkout@v4 - uses: EmbarkStudios/cargo-deny-action@v1 which-6.0.3/.gitignore000064400000000000000000000000360072674642500127530ustar 00000000000000target Cargo.lock .vscode/ which-6.0.3/CHANGELOG.md000064400000000000000000000015660072674642500126050ustar 00000000000000# CHANGELOG ## 6.0.3 - Enhance `tracing` feature with some `debug` level logs for higher level logic. ## 6.0.2 - Add `tracing` feature which outputs debugging information to the [`tracing`](https://crates.io/crates/tracing) ecosystem. ## 6.0.1 - Remove dependency on `once_cell` for Windows users, replace with `std::sync::OnceLock`. ## 6.0.0 - MSRV is now 1.70 - Upgraded all dependencies to latest version ## 5.0.0 - Remove several unused error messages - Windows executables can now be found even if they don't have a '.exe' extension. - Add new error message, `Error::CannotGetCurrentDirAndPathListEmpty` ## 4.4.2 - Remove dependency on `dirs` crate due to MPL licensing in its tree. Use `home` crate instead. (@Xaeroxe) ## 4.4.1 - Add tilde expansion for home directory (@Xaeroxe) - Swap out libc for rustix, forbid unsafe (@notgull) which-6.0.3/Cargo.toml0000644000000031610000000000100101430ustar # THIS FILE IS AUTOMATICALLY GENERATED BY CARGO # # When uploading crates to the registry Cargo will automatically # "normalize" Cargo.toml files for maximal compatibility # with all versions of Cargo and also rewrite `path` dependencies # to registry (e.g., crates.io) dependencies. # # If you are reading this file be aware that the original Cargo.toml # will likely look very different (and much more reasonable). # See Cargo.toml.orig for the original contents. [package] edition = "2021" rust-version = "1.70" name = "which" version = "6.0.3" authors = ["Harry Fei "] description = "A Rust equivalent of Unix command \"which\". Locate installed executable in cross platforms." documentation = "https://docs.rs/which/" readme = "README.md" keywords = [ "which", "which-rs", "unix", "command", ] categories = [ "os", "filesystem", ] license = "MIT" repository = "https://github.com/harryfei/which-rs.git" [package.metadata.docs.rs] all-features = true [dependencies.either] version = "1.9.0" [dependencies.regex] version = "1.10.2" optional = true [dependencies.tracing] version = "0.1.40" optional = true default-features = false [dev-dependencies.tempfile] version = "3.9.0" [features] regex = ["dep:regex"] tracing = ["dep:tracing"] [target."cfg(any(unix, target_os = \"wasi\", target_os = \"redox\"))".dependencies.rustix] version = "0.38.30" features = [ "fs", "std", ] default-features = false [target."cfg(any(windows, unix, target_os = \"redox\"))".dependencies.home] version = "0.5.9" [target."cfg(windows)".dependencies.winsafe] version = "0.0.19" features = ["kernel"] which-6.0.3/Cargo.toml.orig000064400000000000000000000021720072674642500136550ustar 00000000000000[package] name = "which" version = "6.0.3" edition = "2021" rust-version = "1.70" authors = ["Harry Fei "] repository = "https://github.com/harryfei/which-rs.git" documentation = "https://docs.rs/which/" license = "MIT" description = "A Rust equivalent of Unix command \"which\". Locate installed executable in cross platforms." readme = "README.md" categories = ["os", "filesystem"] keywords = ["which", "which-rs", "unix", "command"] [features] regex = ["dep:regex"] tracing = ["dep:tracing"] [dependencies] either = "1.9.0" regex = { version = "1.10.2", optional = true } tracing = { version = "0.1.40", default-features = false, optional = true } [target.'cfg(any(windows, unix, target_os = "redox"))'.dependencies] home = "0.5.9" [target.'cfg(any(unix, target_os = "wasi", target_os = "redox"))'.dependencies] rustix = { version = "0.38.30", default-features = false, features = ["fs", "std"] } [target.'cfg(windows)'.dependencies] winsafe = { version = "0.0.19", features = ["kernel"] } [dev-dependencies] tempfile = "3.9.0" [package.metadata.docs.rs] all-features = true which-6.0.3/LICENSE.txt000064400000000000000000000020630072674642500126100ustar 00000000000000Copyright (c) 2015 fangyuanziti Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. which-6.0.3/README.md000064400000000000000000000025760072674642500122550ustar 00000000000000[![Build Status](https://github.com/harryfei/which-rs/actions/workflows/rust.yml/badge.svg)](https://github.com/harryfei/which-rs/actions/workflows/rust.yml) # which A Rust equivalent of Unix command "which". Locate installed executable in cross platforms. ## Support platforms * Linux * Windows * macOS ## Examples 1) To find which rustc executable binary is using. ``` rust use which::which; let result = which("rustc").unwrap(); assert_eq!(result, PathBuf::from("/usr/bin/rustc")); ``` 2. After enabling the `regex` feature, find all cargo subcommand executables on the path: ``` rust use which::which_re; which_re(Regex::new("^cargo-.*").unwrap()).unwrap() .for_each(|pth| println!("{}", pth.to_string_lossy())); ``` ## MSRV This crate currently has an MSRV of Rust 1.70. Increasing the MSRV is considered a breaking change and thus requires a major version bump. We cannot make any guarantees about the MSRV of our dependencies. You may be required to pin one of our dependencies to a lower version in your own Cargo.toml in order to compile with the minimum supported Rust version. Eventually Cargo will handle this automatically. See [rust-lang/cargo#9930](https://github.com/rust-lang/cargo/issues/9930) for more. ## Documentation The documentation is [available online](https://docs.rs/which/). which-6.0.3/deny.toml000064400000000000000000000260170072674642500126260ustar 00000000000000# This template contains all of the possible sections and their default values # Note that all fields that take a lint level have these possible values: # * deny - An error will be produced and the check will fail # * warn - A warning will be produced, but the check will not fail # * allow - No warning or error will be produced, though in some cases a note # will be # The values provided in this template are the default values that will be used # when any section or field is not specified in your own configuration # Root options # The graph table configures how the dependency graph is constructed and thus # which crates the checks are performed against [graph] # If 1 or more target triples (and optionally, target_features) are specified, # only the specified targets will be checked when running `cargo deny check`. # This means, if a particular package is only ever used as a target specific # dependency, such as, for example, the `nix` crate only being used via the # `target_family = "unix"` configuration, that only having windows targets in # this list would mean the nix crate, as well as any of its exclusive # dependencies not shared by any other crates, would be ignored, as the target # list here is effectively saying which targets you are building for. targets = [ # The triple can be any string, but only the target triples built in to # rustc (as of 1.40) can be checked against actual config expressions #"x86_64-unknown-linux-musl", # You can also specify which target_features you promise are enabled for a # particular target. target_features are currently not validated against # the actual valid features supported by the target architecture. #{ triple = "wasm32-unknown-unknown", features = ["atomics"] }, ] # When creating the dependency graph used as the source of truth when checks are # executed, this field can be used to prune crates from the graph, removing them # from the view of cargo-deny. This is an extremely heavy hammer, as if a crate # is pruned from the graph, all of its dependencies will also be pruned unless # they are connected to another crate in the graph that hasn't been pruned, # so it should be used with care. The identifiers are [Package ID Specifications] # (https://doc.rust-lang.org/cargo/reference/pkgid-spec.html) #exclude = [] # If true, metadata will be collected with `--all-features`. Note that this can't # be toggled off if true, if you want to conditionally enable `--all-features` it # is recommended to pass `--all-features` on the cmd line instead all-features = false # If true, metadata will be collected with `--no-default-features`. The same # caveat with `all-features` applies no-default-features = false # If set, these feature will be enabled when collecting metadata. If `--features` # is specified on the cmd line they will take precedence over this option. #features = [] # The output table provides options for how/if diagnostics are outputted [output] # When outputting inclusion graphs in diagnostics that include features, this # option can be used to specify the depth at which feature edges will be added. # This option is included since the graphs can be quite large and the addition # of features from the crate(s) to all of the graph roots can be far too verbose. # This option can be overridden via `--feature-depth` on the cmd line feature-depth = 1 # This section is considered when running `cargo deny check advisories` # More documentation for the advisories section can be found here: # https://embarkstudios.github.io/cargo-deny/checks/advisories/cfg.html [advisories] # The path where the advisory databases are cloned/fetched into #db-path = "$CARGO_HOME/advisory-dbs" # The url(s) of the advisory databases to use #db-urls = ["https://github.com/rustsec/advisory-db"] # A list of advisory IDs to ignore. Note that ignored advisories will still # output a note when they are encountered. ignore = [ #"RUSTSEC-0000-0000", #{ id = "RUSTSEC-0000-0000", reason = "you can specify a reason the advisory is ignored" }, #"a-crate-that-is-yanked@0.1.1", # you can also ignore yanked crate versions if you wish #{ crate = "a-crate-that-is-yanked@0.1.1", reason = "you can specify why you are ignoring the yanked crate" }, ] # If this is true, then cargo deny will use the git executable to fetch advisory database. # If this is false, then it uses a built-in git library. # Setting this to true can be helpful if you have special authentication requirements that cargo-deny does not support. # See Git Authentication for more information about setting up git authentication. #git-fetch-with-cli = true # This section is considered when running `cargo deny check licenses` # More documentation for the licenses section can be found here: # https://embarkstudios.github.io/cargo-deny/checks/licenses/cfg.html [licenses] # List of explicitly allowed licenses # See https://spdx.org/licenses/ for list of possible licenses # [possible values: any SPDX 3.11 short identifier (+ optional exception)]. allow = [ "MIT", "Apache-2.0", ] # The confidence threshold for detecting a license from license text. # The higher the value, the more closely the license text must be to the # canonical license text of a valid SPDX license file. # [possible values: any between 0.0 and 1.0]. confidence-threshold = 0.8 # Allow 1 or more licenses on a per-crate basis, so that particular licenses # aren't accepted for every possible crate as with the normal allow list exceptions = [ # Each entry is the crate and version constraint, and its specific allow # list #{ allow = ["Zlib"], crate = "adler32" }, ] # Some crates don't have (easily) machine readable licensing information, # adding a clarification entry for it allows you to manually specify the # licensing information #[[licenses.clarify]] # The package spec the clarification applies to #crate = "ring" # The SPDX expression for the license requirements of the crate #expression = "MIT AND ISC AND OpenSSL" # One or more files in the crate's source used as the "source of truth" for # the license expression. If the contents match, the clarification will be used # when running the license check, otherwise the clarification will be ignored # and the crate will be checked normally, which may produce warnings or errors # depending on the rest of your configuration #license-files = [ # Each entry is a crate relative path, and the (opaque) hash of its contents #{ path = "LICENSE", hash = 0xbd0eed23 } #] [licenses.private] # If true, ignores workspace crates that aren't published, or are only # published to private registries. # To see how to mark a crate as unpublished (to the official registry), # visit https://doc.rust-lang.org/cargo/reference/manifest.html#the-publish-field. ignore = false # One or more private registries that you might publish crates to, if a crate # is only published to private registries, and ignore is true, the crate will # not have its license(s) checked registries = [ #"https://sekretz.com/registry ] # This section is considered when running `cargo deny check bans`. # More documentation about the 'bans' section can be found here: # https://embarkstudios.github.io/cargo-deny/checks/bans/cfg.html [bans] # Lint level for when multiple versions of the same crate are detected multiple-versions = "warn" # Lint level for when a crate version requirement is `*` wildcards = "allow" # The graph highlighting used when creating dotgraphs for crates # with multiple versions # * lowest-version - The path to the lowest versioned duplicate is highlighted # * simplest-path - The path to the version with the fewest edges is highlighted # * all - Both lowest-version and simplest-path are used highlight = "all" # The default lint level for `default` features for crates that are members of # the workspace that is being checked. This can be overridden by allowing/denying # `default` on a crate-by-crate basis if desired. workspace-default-features = "allow" # The default lint level for `default` features for external crates that are not # members of the workspace. This can be overridden by allowing/denying `default` # on a crate-by-crate basis if desired. external-default-features = "allow" # List of crates that are allowed. Use with care! allow = [ #"ansi_term@0.11.0", #{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is allowed" }, ] # List of crates to deny deny = [ #"ansi_term@0.11.0", #{ crate = "ansi_term@0.11.0", reason = "you can specify a reason it is banned" }, # Wrapper crates can optionally be specified to allow the crate when it # is a direct dependency of the otherwise banned crate #{ crate = "ansi_term@0.11.0", wrappers = ["this-crate-directly-depends-on-ansi_term"] }, ] # List of features to allow/deny # Each entry the name of a crate and a version range. If version is # not specified, all versions will be matched. #[[bans.features]] #crate = "reqwest" # Features to not allow #deny = ["json"] # Features to allow #allow = [ # "rustls", # "__rustls", # "__tls", # "hyper-rustls", # "rustls", # "rustls-pemfile", # "rustls-tls-webpki-roots", # "tokio-rustls", # "webpki-roots", #] # If true, the allowed features must exactly match the enabled feature set. If # this is set there is no point setting `deny` #exact = true # Certain crates/versions that will be skipped when doing duplicate detection. skip = [ #"ansi_term@0.11.0", #{ crate = "ansi_term@0.11.0", reason = "you can specify a reason why it can't be updated/removed" }, ] # Similarly to `skip` allows you to skip certain crates during duplicate # detection. Unlike skip, it also includes the entire tree of transitive # dependencies starting at the specified crate, up to a certain depth, which is # by default infinite. skip-tree = [ #"ansi_term@0.11.0", # will be skipped along with _all_ of its direct and transitive dependencies #{ crate = "ansi_term@0.11.0", depth = 20 }, ] # This section is considered when running `cargo deny check sources`. # More documentation about the 'sources' section can be found here: # https://embarkstudios.github.io/cargo-deny/checks/sources/cfg.html [sources] # Lint level for what to happen when a crate from a crate registry that is not # in the allow list is encountered unknown-registry = "warn" # Lint level for what to happen when a crate from a git repository that is not # in the allow list is encountered unknown-git = "warn" # List of URLs for allowed crate registries. Defaults to the crates.io index # if not specified. If it is specified but empty, no registries are allowed. allow-registry = ["https://github.com/rust-lang/crates.io-index"] # List of URLs for allowed Git repositories allow-git = [] [sources.allow-org] # 1 or more github.com organizations to allow git sources for github = [""] # 1 or more gitlab.com organizations to allow git sources for gitlab = [""] # 1 or more bitbucket.org organizations to allow git sources for bitbucket = [""] which-6.0.3/src/checker.rs000064400000000000000000000054740072674642500135370ustar 00000000000000use crate::finder::Checker; use std::fs; use std::path::Path; pub struct ExecutableChecker; impl ExecutableChecker { pub fn new() -> ExecutableChecker { ExecutableChecker } } impl Checker for ExecutableChecker { #[cfg(any(unix, target_os = "wasi", target_os = "redox"))] fn is_valid(&self, path: &Path) -> bool { use rustix::fs as rfs; let ret = rfs::access(path, rfs::Access::EXEC_OK).is_ok(); #[cfg(feature = "tracing")] tracing::trace!("{} EXEC_OK = {ret}", path.display()); ret } #[cfg(windows)] fn is_valid(&self, _path: &Path) -> bool { true } } pub struct ExistedChecker; impl ExistedChecker { pub fn new() -> ExistedChecker { ExistedChecker } } impl Checker for ExistedChecker { #[cfg(target_os = "windows")] fn is_valid(&self, path: &Path) -> bool { let ret = fs::symlink_metadata(path) .map(|metadata| { let file_type = metadata.file_type(); #[cfg(feature = "tracing")] tracing::trace!( "{} is_file() = {}, is_symlink() = {}", path.display(), file_type.is_file(), file_type.is_symlink() ); file_type.is_file() || file_type.is_symlink() }) .unwrap_or(false) && (path.extension().is_some() || matches_arch(path)); #[cfg(feature = "tracing")] tracing::trace!( "{} has_extension = {}, ExistedChecker::is_valid() = {ret}", path.display(), path.extension().is_some() ); ret } #[cfg(not(target_os = "windows"))] fn is_valid(&self, path: &Path) -> bool { let ret = fs::metadata(path) .map(|metadata| metadata.is_file()) .unwrap_or(false); #[cfg(feature = "tracing")] tracing::trace!("{} is_file() = {ret}", path.display()); ret } } #[cfg(target_os = "windows")] fn matches_arch(path: &Path) -> bool { let ret = winsafe::GetBinaryType(&path.display().to_string()).is_ok(); #[cfg(feature = "tracing")] tracing::trace!("{} matches_arch() = {ret}", path.display()); ret } pub struct CompositeChecker { checkers: Vec>, } impl CompositeChecker { pub fn new() -> CompositeChecker { CompositeChecker { checkers: Vec::new(), } } pub fn add_checker(mut self, checker: Box) -> CompositeChecker { self.checkers.push(checker); self } } impl Checker for CompositeChecker { fn is_valid(&self, path: &Path) -> bool { self.checkers.iter().all(|checker| checker.is_valid(path)) } } which-6.0.3/src/error.rs000064400000000000000000000016620072674642500132570ustar 00000000000000use std::fmt; pub type Result = std::result::Result; #[derive(Copy, Clone, Eq, PartialEq, Debug)] pub enum Error { /// An executable binary with that name was not found CannotFindBinaryPath, /// There was nowhere to search and the provided name wasn't an absolute path CannotGetCurrentDirAndPathListEmpty, /// Failed to canonicalize the path found CannotCanonicalize, } impl std::error::Error for Error {} impl fmt::Display for Error { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { match self { Error::CannotFindBinaryPath => write!(f, "cannot find binary path"), Error::CannotGetCurrentDirAndPathListEmpty => write!( f, "no path to search and provided name is not an absolute path" ), Error::CannotCanonicalize => write!(f, "cannot canonicalize path"), } } } which-6.0.3/src/finder.rs000064400000000000000000000236060072674642500133770ustar 00000000000000use crate::checker::CompositeChecker; use crate::error::*; #[cfg(windows)] use crate::helper::has_executable_extension; use either::Either; #[cfg(feature = "regex")] use regex::Regex; #[cfg(feature = "regex")] use std::borrow::Borrow; use std::borrow::Cow; use std::env; use std::ffi::OsStr; #[cfg(any(feature = "regex", target_os = "windows"))] use std::fs; use std::iter; use std::path::{Component, Path, PathBuf}; // Home dir shim, use home crate when possible. Otherwise, return None #[cfg(any(windows, unix, target_os = "redox"))] use home::home_dir; #[cfg(not(any(windows, unix, target_os = "redox")))] fn home_dir() -> Option { None } pub trait Checker { fn is_valid(&self, path: &Path) -> bool; } trait PathExt { fn has_separator(&self) -> bool; fn to_absolute

(self, cwd: P) -> PathBuf where P: AsRef; } impl PathExt for PathBuf { fn has_separator(&self) -> bool { self.components().count() > 1 } fn to_absolute

(self, cwd: P) -> PathBuf where P: AsRef, { if self.is_absolute() { self } else { let mut new_path = PathBuf::from(cwd.as_ref()); new_path.push(self); new_path } } } pub struct Finder; impl Finder { pub fn new() -> Finder { Finder } pub fn find( &self, binary_name: T, paths: Option, cwd: Option, binary_checker: CompositeChecker, ) -> Result> where T: AsRef, U: AsRef, V: AsRef, { let path = PathBuf::from(&binary_name); #[cfg(feature = "tracing")] tracing::debug!( "query binary_name = {:?}, paths = {:?}, cwd = {:?}", binary_name.as_ref().to_string_lossy(), paths.as_ref().map(|p| p.as_ref().to_string_lossy()), cwd.as_ref().map(|p| p.as_ref().display()) ); let binary_path_candidates = match cwd { Some(cwd) if path.has_separator() => { #[cfg(feature = "tracing")] tracing::trace!( "{} has a path seperator, so only CWD will be searched.", path.display() ); // Search binary in cwd if the path have a path separator. Either::Left(Self::cwd_search_candidates(path, cwd).into_iter()) } _ => { #[cfg(feature = "tracing")] tracing::trace!("{} has no path seperators, so only paths in PATH environment variable will be searched.", path.display()); // Search binary in PATHs(defined in environment variable). let paths = env::split_paths(&paths.ok_or(Error::CannotGetCurrentDirAndPathListEmpty)?) .collect::>(); if paths.is_empty() { return Err(Error::CannotGetCurrentDirAndPathListEmpty); } Either::Right(Self::path_search_candidates(path, paths).into_iter()) } }; let ret = binary_path_candidates .filter(move |p| binary_checker.is_valid(p)) .map(correct_casing); #[cfg(feature = "tracing")] let ret = ret.map(|p| { tracing::debug!("found path {}", p.display()); p }); Ok(ret) } #[cfg(feature = "regex")] pub fn find_re( &self, binary_regex: impl Borrow, paths: Option, binary_checker: CompositeChecker, ) -> Result> where T: AsRef, { let p = paths.ok_or(Error::CannotGetCurrentDirAndPathListEmpty)?; // Collect needs to happen in order to not have to // change the API to borrow on `paths`. #[allow(clippy::needless_collect)] let paths: Vec<_> = env::split_paths(&p).collect(); let matching_re = paths .into_iter() .flat_map(fs::read_dir) .flatten() .flatten() .map(|e| e.path()) .filter(move |p| { if let Some(unicode_file_name) = p.file_name().unwrap().to_str() { binary_regex.borrow().is_match(unicode_file_name) } else { false } }) .filter(move |p| binary_checker.is_valid(p)); Ok(matching_re) } fn cwd_search_candidates(binary_name: PathBuf, cwd: C) -> impl IntoIterator where C: AsRef, { let path = binary_name.to_absolute(cwd); Self::append_extension(iter::once(path)) } fn path_search_candidates

( binary_name: PathBuf, paths: P, ) -> impl IntoIterator where P: IntoIterator, { let new_paths = paths .into_iter() .map(move |p| tilde_expansion(&p).join(binary_name.clone())); Self::append_extension(new_paths) } #[cfg(not(windows))] fn append_extension

(paths: P) -> impl IntoIterator where P: IntoIterator, { paths } #[cfg(windows)] fn append_extension

(paths: P) -> impl IntoIterator where P: IntoIterator, { use std::sync::OnceLock; // Sample %PATHEXT%: .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC // PATH_EXTENSIONS is then [".COM", ".EXE", ".BAT", …]. // (In one use of PATH_EXTENSIONS we skip the dot, but in the other we need it; // hence its retention.) static PATH_EXTENSIONS: OnceLock> = OnceLock::new(); paths .into_iter() .flat_map(move |p| -> Box> { let path_extensions = PATH_EXTENSIONS.get_or_init(|| { env::var("PATHEXT") .map(|pathext| { pathext .split(';') .filter_map(|s| { if s.as_bytes().first() == Some(&b'.') { Some(s.to_owned()) } else { // Invalid segment; just ignore it. None } }) .collect() }) // PATHEXT not being set or not being a proper Unicode string is exceedingly // improbable and would probably break Windows badly. Still, don't crash: .unwrap_or_default() }); // Check if path already have executable extension if has_executable_extension(&p, path_extensions) { #[cfg(feature = "tracing")] tracing::trace!( "{} already has an executable extension, not modifying it further", p.display() ); Box::new(iter::once(p)) } else { #[cfg(feature = "tracing")] tracing::trace!( "{} has no extension, using PATHEXT environment variable to infer one", p.display() ); // Appended paths with windows executable extensions. // e.g. path `c:/windows/bin[.ext]` will expand to: // [c:/windows/bin.ext] // c:/windows/bin[.ext].COM // c:/windows/bin[.ext].EXE // c:/windows/bin[.ext].CMD // ... Box::new( iter::once(p.clone()).chain(path_extensions.iter().map(move |e| { // Append the extension. let mut p = p.clone().into_os_string(); p.push(e); let ret = PathBuf::from(p); #[cfg(feature = "tracing")] tracing::trace!("possible extension: {}", ret.display()); ret })), ) } }) } } fn tilde_expansion(p: &PathBuf) -> Cow<'_, PathBuf> { let mut component_iter = p.components(); if let Some(Component::Normal(o)) = component_iter.next() { if o == "~" { let mut new_path = home_dir().unwrap_or_default(); new_path.extend(component_iter); #[cfg(feature = "tracing")] tracing::trace!( "found tilde, substituting in user's home directory to get {}", new_path.display() ); Cow::Owned(new_path) } else { Cow::Borrowed(p) } } else { Cow::Borrowed(p) } } #[cfg(target_os = "windows")] fn correct_casing(mut p: PathBuf) -> PathBuf { if let (Some(parent), Some(file_name)) = (p.parent(), p.file_name()) { if let Ok(iter) = fs::read_dir(parent) { for e in iter.filter_map(std::result::Result::ok) { if e.file_name().eq_ignore_ascii_case(file_name) { p.pop(); p.push(e.file_name()); break; } } } } p } #[cfg(not(target_os = "windows"))] fn correct_casing(p: PathBuf) -> PathBuf { p } which-6.0.3/src/helper.rs000064400000000000000000000020640072674642500134020ustar 00000000000000use std::path::Path; /// Check if given path has extension which in the given vector. pub fn has_executable_extension, S: AsRef>(path: T, pathext: &[S]) -> bool { let ext = path.as_ref().extension().and_then(|e| e.to_str()); match ext { Some(ext) => pathext .iter() .any(|e| ext.eq_ignore_ascii_case(&e.as_ref()[1..])), _ => false, } } #[cfg(test)] mod test { use super::*; use std::path::PathBuf; #[test] fn test_extension_in_extension_vector() { // Case insensitive assert!(has_executable_extension( PathBuf::from("foo.exe"), &[".COM", ".EXE", ".CMD"] )); assert!(has_executable_extension( PathBuf::from("foo.CMD"), &[".COM", ".EXE", ".CMD"] )); } #[test] fn test_extension_not_in_extension_vector() { assert!(!has_executable_extension( PathBuf::from("foo.bar"), &[".COM", ".EXE", ".CMD"] )); } } which-6.0.3/src/lib.rs000064400000000000000000000474030072674642500126770ustar 00000000000000//! which //! //! A Rust equivalent of Unix command `which(1)`. //! # Example: //! //! To find which rustc executable binary is using: //! //! ```no_run //! use which::which; //! use std::path::PathBuf; //! //! let result = which("rustc").unwrap(); //! assert_eq!(result, PathBuf::from("/usr/bin/rustc")); //! //! ``` #![forbid(unsafe_code)] mod checker; mod error; mod finder; #[cfg(windows)] mod helper; #[cfg(feature = "regex")] use std::borrow::Borrow; use std::env; use std::fmt; use std::path; use std::ffi::{OsStr, OsString}; use crate::checker::{CompositeChecker, ExecutableChecker, ExistedChecker}; pub use crate::error::*; use crate::finder::Finder; /// Find an executable binary's path by name. /// /// If given an absolute path, returns it if the file exists and is executable. /// /// If given a relative path, returns an absolute path to the file if /// it exists and is executable. /// /// If given a string without path separators, looks for a file named /// `binary_name` at each directory in `$PATH` and if it finds an executable /// file there, returns it. /// /// # Example /// /// ```no_run /// use which::which; /// use std::path::PathBuf; /// /// let result = which::which("rustc").unwrap(); /// assert_eq!(result, PathBuf::from("/usr/bin/rustc")); /// /// ``` pub fn which>(binary_name: T) -> Result { which_all(binary_name).and_then(|mut i| i.next().ok_or(Error::CannotFindBinaryPath)) } /// Find an executable binary's path by name, ignoring `cwd`. /// /// If given an absolute path, returns it if the file exists and is executable. /// /// Does not resolve relative paths. /// /// If given a string without path separators, looks for a file named /// `binary_name` at each directory in `$PATH` and if it finds an executable /// file there, returns it. /// /// # Example /// /// ```no_run /// use which::which; /// use std::path::PathBuf; /// /// let result = which::which_global("rustc").unwrap(); /// assert_eq!(result, PathBuf::from("/usr/bin/rustc")); /// /// ``` pub fn which_global>(binary_name: T) -> Result { which_all_global(binary_name).and_then(|mut i| i.next().ok_or(Error::CannotFindBinaryPath)) } /// Find all binaries with `binary_name` using `cwd` to resolve relative paths. pub fn which_all>(binary_name: T) -> Result> { let cwd = env::current_dir().ok(); let binary_checker = build_binary_checker(); let finder = Finder::new(); finder.find(binary_name, env::var_os("PATH"), cwd, binary_checker) } /// Find all binaries with `binary_name` ignoring `cwd`. pub fn which_all_global>( binary_name: T, ) -> Result> { let binary_checker = build_binary_checker(); let finder = Finder::new(); finder.find( binary_name, env::var_os("PATH"), Option::<&Path>::None, binary_checker, ) } /// Find all binaries matching a regular expression in a the system PATH. /// /// Only available when feature `regex` is enabled. /// /// # Arguments /// /// * `regex` - A regular expression to match binaries with /// /// # Examples /// /// Find Python executables: /// /// ```no_run /// use regex::Regex; /// use which::which; /// use std::path::PathBuf; /// /// let re = Regex::new(r"python\d$").unwrap(); /// let binaries: Vec = which::which_re(re).unwrap().collect(); /// let python_paths = vec![PathBuf::from("/usr/bin/python2"), PathBuf::from("/usr/bin/python3")]; /// assert_eq!(binaries, python_paths); /// ``` /// /// Find all cargo subcommand executables on the path: /// /// ``` /// use which::which_re; /// use regex::Regex; /// /// which_re(Regex::new("^cargo-.*").unwrap()).unwrap() /// .for_each(|pth| println!("{}", pth.to_string_lossy())); /// ``` #[cfg(feature = "regex")] pub fn which_re(regex: impl Borrow) -> Result> { which_re_in(regex, env::var_os("PATH")) } /// Find `binary_name` in the path list `paths`, using `cwd` to resolve relative paths. pub fn which_in(binary_name: T, paths: Option, cwd: V) -> Result where T: AsRef, U: AsRef, V: AsRef, { which_in_all(binary_name, paths, cwd) .and_then(|mut i| i.next().ok_or(Error::CannotFindBinaryPath)) } /// Find all binaries matching a regular expression in a list of paths. /// /// Only available when feature `regex` is enabled. /// /// # Arguments /// /// * `regex` - A regular expression to match binaries with /// * `paths` - A string containing the paths to search /// (separated in the same way as the PATH environment variable) /// /// # Examples /// /// ```no_run /// use regex::Regex; /// use which::which; /// use std::path::PathBuf; /// /// let re = Regex::new(r"python\d$").unwrap(); /// let paths = Some("/usr/bin:/usr/local/bin"); /// let binaries: Vec = which::which_re_in(re, paths).unwrap().collect(); /// let python_paths = vec![PathBuf::from("/usr/bin/python2"), PathBuf::from("/usr/bin/python3")]; /// assert_eq!(binaries, python_paths); /// ``` #[cfg(feature = "regex")] pub fn which_re_in( regex: impl Borrow, paths: Option, ) -> Result> where T: AsRef, { let binary_checker = build_binary_checker(); let finder = Finder::new(); finder.find_re(regex, paths, binary_checker) } /// Find all binaries with `binary_name` in the path list `paths`, using `cwd` to resolve relative paths. pub fn which_in_all( binary_name: T, paths: Option, cwd: V, ) -> Result> where T: AsRef, U: AsRef, V: AsRef, { let binary_checker = build_binary_checker(); let finder = Finder::new(); finder.find(binary_name, paths, Some(cwd), binary_checker) } /// Find all binaries with `binary_name` in the path list `paths`, ignoring `cwd`. pub fn which_in_global( binary_name: T, paths: Option, ) -> Result> where T: AsRef, U: AsRef, { let binary_checker = build_binary_checker(); let finder = Finder::new(); finder.find(binary_name, paths, Option::<&Path>::None, binary_checker) } fn build_binary_checker() -> CompositeChecker { CompositeChecker::new() .add_checker(Box::new(ExistedChecker::new())) .add_checker(Box::new(ExecutableChecker::new())) } /// A wrapper containing all functionality in this crate. pub struct WhichConfig { cwd: Option>, custom_path_list: Option, binary_name: Option, #[cfg(feature = "regex")] regex: Option, } impl Default for WhichConfig { fn default() -> Self { Self { cwd: Some(either::Either::Left(true)), custom_path_list: None, binary_name: None, #[cfg(feature = "regex")] regex: None, } } } #[cfg(feature = "regex")] type Regex = regex::Regex; #[cfg(not(feature = "regex"))] type Regex = (); impl WhichConfig { pub fn new() -> Self { Self::default() } /// Whether or not to use the current working directory. `true` by default. /// /// # Panics /// /// If regex was set previously, and you've just passed in `use_cwd: true`, this will panic. pub fn system_cwd(mut self, use_cwd: bool) -> Self { #[cfg(feature = "regex")] if self.regex.is_some() && use_cwd { panic!("which can't use regex and cwd at the same time!") } self.cwd = Some(either::Either::Left(use_cwd)); self } /// Sets a custom path for resolving relative paths. /// /// # Panics /// /// If regex was set previously, this will panic. pub fn custom_cwd(mut self, cwd: path::PathBuf) -> Self { #[cfg(feature = "regex")] if self.regex.is_some() { panic!("which can't use regex and cwd at the same time!") } self.cwd = Some(either::Either::Right(cwd)); self } /// Sets the path name regex to search for. You ***MUST*** call this, or [`Self::binary_name`] prior to searching. /// /// When `Regex` is disabled this function takes the unit type as a stand in. The parameter will change when /// `Regex` is enabled. /// /// # Panics /// /// If the `regex` feature wasn't turned on for this crate this will always panic. Additionally if a /// `cwd` (aka current working directory) or `binary_name` was set previously, this will panic, as those options /// are incompatible with `regex`. #[allow(unused_variables)] #[allow(unused_mut)] pub fn regex(mut self, regex: Regex) -> Self { #[cfg(not(feature = "regex"))] { panic!("which's regex feature was not enabled in your Cargo.toml!") } #[cfg(feature = "regex")] { if self.cwd != Some(either::Either::Left(false)) && self.cwd.is_some() { panic!("which can't use regex and cwd at the same time!") } if self.binary_name.is_some() { panic!("which can't use `binary_name` and `regex` at the same time!"); } self.regex = Some(regex); self } } /// Sets the path name to search for. You ***MUST*** call this, or [`Self::regex`] prior to searching. /// /// # Panics /// /// If a `regex` was set previously this will panic as this is not compatible with `regex`. pub fn binary_name(mut self, name: OsString) -> Self { #[cfg(feature = "regex")] if self.regex.is_some() { panic!("which can't use `binary_name` and `regex` at the same time!"); } self.binary_name = Some(name); self } /// Uses the given string instead of the `PATH` env variable. pub fn custom_path_list(mut self, custom_path_list: OsString) -> Self { self.custom_path_list = Some(custom_path_list); self } /// Uses the `PATH` env variable. Enabled by default. pub fn system_path_list(mut self) -> Self { self.custom_path_list = None; self } /// Finishes configuring, runs the query and returns the first result. pub fn first_result(self) -> Result { self.all_results() .and_then(|mut i| i.next().ok_or(Error::CannotFindBinaryPath)) } /// Finishes configuring, runs the query and returns all results. pub fn all_results(self) -> Result> { let binary_checker = build_binary_checker(); let finder = Finder::new(); let paths = self.custom_path_list.or_else(|| env::var_os("PATH")); #[cfg(feature = "regex")] if let Some(regex) = self.regex { return finder .find_re(regex, paths, binary_checker) .map(|i| Box::new(i) as Box>); } let cwd = match self.cwd { Some(either::Either::Left(false)) => None, Some(either::Either::Right(custom)) => Some(custom), None | Some(either::Either::Left(true)) => env::current_dir().ok(), }; finder .find( self.binary_name.expect( "binary_name not set! You must set binary_name or regex before searching!", ), paths, cwd, binary_checker, ) .map(|i| Box::new(i) as Box>) } } /// An owned, immutable wrapper around a `PathBuf` containing the path of an executable. /// /// The constructed `PathBuf` is the output of `which` or `which_in`, but `which::Path` has the /// advantage of being a type distinct from `std::path::Path` and `std::path::PathBuf`. /// /// It can be beneficial to use `which::Path` instead of `std::path::Path` when you want the type /// system to enforce the need for a path that exists and points to a binary that is executable. /// /// Since `which::Path` implements `Deref` for `std::path::Path`, all methods on `&std::path::Path` /// are also available to `&which::Path` values. #[derive(Clone, PartialEq, Eq)] pub struct Path { inner: path::PathBuf, } impl Path { /// Returns the path of an executable binary by name. /// /// This calls `which` and maps the result into a `Path`. pub fn new>(binary_name: T) -> Result { which(binary_name).map(|inner| Path { inner }) } /// Returns the paths of all executable binaries by a name. /// /// this calls `which_all` and maps the results into `Path`s. pub fn all>(binary_name: T) -> Result> { which_all(binary_name).map(|inner| inner.map(|inner| Path { inner })) } /// Returns the path of an executable binary by name in the path list `paths` and using the /// current working directory `cwd` to resolve relative paths. /// /// This calls `which_in` and maps the result into a `Path`. pub fn new_in(binary_name: T, paths: Option, cwd: V) -> Result where T: AsRef, U: AsRef, V: AsRef, { which_in(binary_name, paths, cwd).map(|inner| Path { inner }) } /// Returns all paths of an executable binary by name in the path list `paths` and using the /// current working directory `cwd` to resolve relative paths. /// /// This calls `which_in_all` and maps the results into a `Path`. pub fn all_in( binary_name: T, paths: Option, cwd: V, ) -> Result> where T: AsRef, U: AsRef, V: AsRef, { which_in_all(binary_name, paths, cwd).map(|inner| inner.map(|inner| Path { inner })) } /// Returns a reference to a `std::path::Path`. pub fn as_path(&self) -> &path::Path { self.inner.as_path() } /// Consumes the `which::Path`, yielding its underlying `std::path::PathBuf`. pub fn into_path_buf(self) -> path::PathBuf { self.inner } } impl fmt::Debug for Path { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { fmt::Debug::fmt(&self.inner, f) } } impl std::ops::Deref for Path { type Target = path::Path; fn deref(&self) -> &path::Path { self.inner.deref() } } impl AsRef for Path { fn as_ref(&self) -> &path::Path { self.as_path() } } impl AsRef for Path { fn as_ref(&self) -> &OsStr { self.as_os_str() } } impl PartialEq for Path { fn eq(&self, other: &path::PathBuf) -> bool { self.inner == *other } } impl PartialEq for path::PathBuf { fn eq(&self, other: &Path) -> bool { *self == other.inner } } /// An owned, immutable wrapper around a `PathBuf` containing the _canonical_ path of an /// executable. /// /// The constructed `PathBuf` is the result of `which` or `which_in` followed by /// `Path::canonicalize`, but `CanonicalPath` has the advantage of being a type distinct from /// `std::path::Path` and `std::path::PathBuf`. /// /// It can be beneficial to use `CanonicalPath` instead of `std::path::Path` when you want the type /// system to enforce the need for a path that exists, points to a binary that is executable, is /// absolute, has all components normalized, and has all symbolic links resolved /// /// Since `CanonicalPath` implements `Deref` for `std::path::Path`, all methods on /// `&std::path::Path` are also available to `&CanonicalPath` values. #[derive(Clone, PartialEq, Eq)] pub struct CanonicalPath { inner: path::PathBuf, } impl CanonicalPath { /// Returns the canonical path of an executable binary by name. /// /// This calls `which` and `Path::canonicalize` and maps the result into a `CanonicalPath`. pub fn new>(binary_name: T) -> Result { which(binary_name) .and_then(|p| p.canonicalize().map_err(|_| Error::CannotCanonicalize)) .map(|inner| CanonicalPath { inner }) } /// Returns the canonical paths of an executable binary by name. /// /// This calls `which_all` and `Path::canonicalize` and maps the results into `CanonicalPath`s. pub fn all>( binary_name: T, ) -> Result>> { which_all(binary_name).map(|inner| { inner.map(|inner| { inner .canonicalize() .map_err(|_| Error::CannotCanonicalize) .map(|inner| CanonicalPath { inner }) }) }) } /// Returns the canonical path of an executable binary by name in the path list `paths` and /// using the current working directory `cwd` to resolve relative paths. /// /// This calls `which_in` and `Path::canonicalize` and maps the result into a `CanonicalPath`. pub fn new_in(binary_name: T, paths: Option, cwd: V) -> Result where T: AsRef, U: AsRef, V: AsRef, { which_in(binary_name, paths, cwd) .and_then(|p| p.canonicalize().map_err(|_| Error::CannotCanonicalize)) .map(|inner| CanonicalPath { inner }) } /// Returns all of the canonical paths of an executable binary by name in the path list `paths` and /// using the current working directory `cwd` to resolve relative paths. /// /// This calls `which_in_all` and `Path::canonicalize` and maps the result into a `CanonicalPath`. pub fn all_in( binary_name: T, paths: Option, cwd: V, ) -> Result>> where T: AsRef, U: AsRef, V: AsRef, { which_in_all(binary_name, paths, cwd).map(|inner| { inner.map(|inner| { inner .canonicalize() .map_err(|_| Error::CannotCanonicalize) .map(|inner| CanonicalPath { inner }) }) }) } /// Returns a reference to a `std::path::Path`. pub fn as_path(&self) -> &path::Path { self.inner.as_path() } /// Consumes the `which::CanonicalPath`, yielding its underlying `std::path::PathBuf`. pub fn into_path_buf(self) -> path::PathBuf { self.inner } } impl fmt::Debug for CanonicalPath { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { fmt::Debug::fmt(&self.inner, f) } } impl std::ops::Deref for CanonicalPath { type Target = path::Path; fn deref(&self) -> &path::Path { self.inner.deref() } } impl AsRef for CanonicalPath { fn as_ref(&self) -> &path::Path { self.as_path() } } impl AsRef for CanonicalPath { fn as_ref(&self) -> &OsStr { self.as_os_str() } } impl PartialEq for CanonicalPath { fn eq(&self, other: &path::PathBuf) -> bool { self.inner == *other } } impl PartialEq for path::PathBuf { fn eq(&self, other: &CanonicalPath) -> bool { *self == other.inner } } which-6.0.3/tests/basic.rs000064400000000000000000000317320072674642500135630ustar 00000000000000extern crate which; #[cfg(all(unix, feature = "regex"))] use regex::Regex; use std::ffi::{OsStr, OsString}; use std::fs; use std::io; use std::path::{Path, PathBuf}; use std::{env, vec}; use tempfile::TempDir; #[derive(Debug)] struct TestFixture { /// Temp directory. pub tempdir: TempDir, /// $PATH pub paths: OsString, /// Binaries created in $PATH pub bins: Vec, } const SUBDIRS: &[&str] = &["a", "b", "c"]; const BIN_NAME: &str = "bin"; #[allow(clippy::unnecessary_cast)] #[cfg(unix)] fn mk_bin(dir: &Path, path: &str, extension: &str) -> io::Result { use std::os::unix::fs::OpenOptionsExt; let bin = dir.join(path).with_extension(extension); #[cfg(any(target_os = "macos", target_os = "linux"))] let mode = rustix::fs::Mode::XUSR.bits() as u32; let mode = 0o666 | mode; fs::OpenOptions::new() .write(true) .create(true) .mode(mode) .open(&bin) .and_then(|_f| bin.canonicalize()) } fn touch(dir: &Path, path: &str, extension: &str) -> io::Result { let b = dir.join(path).with_extension(extension); fs::File::create(&b).and_then(|_f| b.canonicalize()) } #[cfg(windows)] fn mk_bin(dir: &Path, path: &str, extension: &str) -> io::Result { touch(dir, path, extension) } impl TestFixture { // tmp/a/bin // tmp/a/bin.exe // tmp/a/bin.cmd // tmp/b/bin // tmp/b/bin.exe // tmp/b/bin.cmd // tmp/c/bin // tmp/c/bin.exe // tmp/c/bin.cmd pub fn new() -> TestFixture { let tempdir = tempfile::tempdir().unwrap(); let mut builder = fs::DirBuilder::new(); builder.recursive(true); let mut paths = vec![]; let mut bins = vec![]; for d in SUBDIRS.iter() { let p = tempdir.path().join(d); builder.create(&p).unwrap(); bins.push(mk_bin(&p, BIN_NAME, "").unwrap()); bins.push(mk_bin(&p, BIN_NAME, "exe").unwrap()); bins.push(mk_bin(&p, BIN_NAME, "cmd").unwrap()); paths.push(p); } let p = tempdir.path().join("win-bin"); builder.create(&p).unwrap(); bins.push(mk_bin(&p, "win-bin", "exe").unwrap()); paths.push(p); TestFixture { tempdir, paths: env::join_paths(paths).unwrap(), bins, } } #[cfg(unix)] pub fn new_with_tilde_path() -> TestFixture { let tempdir = tempfile::tempdir().unwrap(); let mut builder = fs::DirBuilder::new(); builder.recursive(true); let mut paths = vec![]; let mut bins = vec![]; for d in SUBDIRS.iter() { let p = PathBuf::from("~").join(d); let p_bin = tempdir.path().join(d); builder.create(&p_bin).unwrap(); bins.push(mk_bin(&p_bin, BIN_NAME, "").unwrap()); bins.push(mk_bin(&p_bin, BIN_NAME, "exe").unwrap()); bins.push(mk_bin(&p_bin, BIN_NAME, "cmd").unwrap()); paths.push(p); } let p = tempdir.path().join("win-bin"); builder.create(&p).unwrap(); bins.push(mk_bin(&p, "win-bin", "exe").unwrap()); paths.push(p); TestFixture { tempdir, paths: env::join_paths(paths).unwrap(), bins, } } #[allow(dead_code)] pub fn touch(&self, path: &str, extension: &str) -> io::Result { touch(self.tempdir.path(), path, extension) } pub fn mk_bin(&self, path: &str, extension: &str) -> io::Result { mk_bin(self.tempdir.path(), path, extension) } } fn _which>(f: &TestFixture, path: T) -> which::Result { which::CanonicalPath::new_in(path, Some(f.paths.clone()), f.tempdir.path()) } fn _which_all<'a, T: AsRef + 'a>( f: &'a TestFixture, path: T, ) -> which::Result> + '_> { which::CanonicalPath::all_in(path, Some(f.paths.clone()), f.tempdir.path()) } #[test] #[cfg(unix)] fn it_works() { use std::process::Command; let result = which::Path::new("rustc"); assert!(result.is_ok()); let which_result = Command::new("which").arg("rustc").output(); assert_eq!( String::from(result.unwrap().to_str().unwrap()), String::from_utf8(which_result.unwrap().stdout) .unwrap() .trim() ); } #[test] #[cfg(unix)] fn test_which() { let f = TestFixture::new(); assert_eq!(_which(&f, BIN_NAME).unwrap(), f.bins[0]) } #[test] #[cfg(windows)] fn test_which() { let f = TestFixture::new(); assert_eq!(_which(&f, BIN_NAME).unwrap(), f.bins[1]) } #[test] #[cfg(unix)] fn test_which_tilde() { let old_home = env::var_os("HOME"); let f = TestFixture::new_with_tilde_path(); env::set_var("HOME", f.tempdir.path().as_os_str()); assert_eq!(_which(&f, BIN_NAME).unwrap(), f.bins[0]); if let Some(old_home) = old_home { env::set_var("HOME", old_home); } else { env::remove_var("HOME"); } } // Windows test_which_tilde intentionally omitted because // we don't want to pollute the home directory. // It's non-trivial to adjust which directory Windows thinks // is the home directory. At this time, tilde expansion has // no Windows specific behavior. It works as normal on Windows. #[test] #[cfg(all(unix, feature = "regex"))] fn test_which_re_in_with_matches() { let f = TestFixture::new(); f.mk_bin("a/bin_0", "").unwrap(); f.mk_bin("b/bin_1", "").unwrap(); let re = Regex::new(r"bin_\d").unwrap(); let result: Vec = which::which_re_in(re, Some(f.paths)).unwrap().collect(); let temp = f.tempdir; assert_eq!( result, vec![temp.path().join("a/bin_0"), temp.path().join("b/bin_1")] ) } #[test] #[cfg(all(unix, feature = "regex"))] fn test_which_re_in_without_matches() { let f = TestFixture::new(); let re = Regex::new(r"bi[^n]").unwrap(); let result: Vec = which::which_re_in(re, Some(f.paths)).unwrap().collect(); assert_eq!(result, Vec::::new()) } #[test] #[cfg(all(unix, feature = "regex"))] fn test_which_re_accepts_owned_and_borrow() { which::which_re(Regex::new(r".").unwrap()) .unwrap() .for_each(drop); which::which_re(&Regex::new(r".").unwrap()) .unwrap() .for_each(drop); which::which_re_in(Regex::new(r".").unwrap(), Some("pth")) .unwrap() .for_each(drop); which::which_re_in(&Regex::new(r".").unwrap(), Some("pth")) .unwrap() .for_each(drop); } #[test] #[cfg(unix)] fn test_which_extension() { let f = TestFixture::new(); let b = Path::new(&BIN_NAME).with_extension(""); assert_eq!(_which(&f, b).unwrap(), f.bins[0]) } #[test] #[cfg(windows)] fn test_which_extension() { let f = TestFixture::new(); let b = Path::new(&BIN_NAME).with_extension("cmd"); assert_eq!(_which(&f, b).unwrap(), f.bins[2]) } #[test] #[cfg(windows)] fn test_which_no_extension() { let f = TestFixture::new(); let b = Path::new("win-bin"); let which_result = which::which_in(b, Some(&f.paths), ".").unwrap(); // Make sure the extension is the correct case. assert_eq!(which_result.extension(), f.bins[9].extension()); assert_eq!(fs::canonicalize(&which_result).unwrap(), f.bins[9]) } #[test] fn test_which_not_found() { let f = TestFixture::new(); assert!(_which(&f, "a").is_err()); } #[test] fn test_which_second() { let f = TestFixture::new(); let b = f.mk_bin("b/another", env::consts::EXE_EXTENSION).unwrap(); assert_eq!(_which(&f, "another").unwrap(), b); } #[test] fn test_which_all() { let f = TestFixture::new(); let actual = _which_all(&f, BIN_NAME) .unwrap() .map(|c| c.unwrap()) .collect::>(); let mut expected = f .bins .iter() .map(|p| p.canonicalize().unwrap()) .collect::>(); #[cfg(windows)] { expected.retain(|p| p.file_stem().unwrap() == BIN_NAME); expected.retain(|p| p.extension().map(|ext| ext == "exe" || ext == "cmd") == Some(true)); } #[cfg(not(windows))] { expected.retain(|p| p.file_name().unwrap() == BIN_NAME); } assert_eq!(actual, expected); } #[test] #[cfg(unix)] fn test_which_absolute() { let f = TestFixture::new(); assert_eq!( _which(&f, &f.bins[3]).unwrap(), f.bins[3].canonicalize().unwrap() ); } #[test] #[cfg(windows)] fn test_which_absolute() { let f = TestFixture::new(); assert_eq!( _which(&f, &f.bins[4]).unwrap(), f.bins[4].canonicalize().unwrap() ); } #[test] #[cfg(windows)] fn test_which_absolute_path_case() { // Test that an absolute path with an uppercase extension // is accepted. let f = TestFixture::new(); let p = &f.bins[4]; assert_eq!(_which(&f, p).unwrap(), f.bins[4].canonicalize().unwrap()); } #[test] #[cfg(unix)] fn test_which_absolute_extension() { let f = TestFixture::new(); // Don't append EXE_EXTENSION here. let b = f.bins[3].parent().unwrap().join(BIN_NAME); assert_eq!(_which(&f, b).unwrap(), f.bins[3].canonicalize().unwrap()); } #[test] #[cfg(windows)] fn test_which_absolute_extension() { let f = TestFixture::new(); // Don't append EXE_EXTENSION here. let b = f.bins[4].parent().unwrap().join(BIN_NAME); assert_eq!(_which(&f, b).unwrap(), f.bins[4].canonicalize().unwrap()); } #[test] #[cfg(unix)] fn test_which_relative() { let f = TestFixture::new(); assert_eq!( _which(&f, "b/bin").unwrap(), f.bins[3].canonicalize().unwrap() ); } #[test] #[cfg(windows)] fn test_which_relative() { let f = TestFixture::new(); assert_eq!( _which(&f, "b/bin").unwrap(), f.bins[4].canonicalize().unwrap() ); } #[test] #[cfg(unix)] fn test_which_relative_extension() { // test_which_relative tests a relative path without an extension, // so test a relative path with an extension here. let f = TestFixture::new(); let b = Path::new("b/bin").with_extension(env::consts::EXE_EXTENSION); assert_eq!(_which(&f, b).unwrap(), f.bins[3].canonicalize().unwrap()); } #[test] #[cfg(windows)] fn test_which_relative_extension() { // test_which_relative tests a relative path without an extension, // so test a relative path with an extension here. let f = TestFixture::new(); let b = Path::new("b/bin").with_extension("cmd"); assert_eq!(_which(&f, b).unwrap(), f.bins[5].canonicalize().unwrap()); } #[test] #[cfg(windows)] fn test_which_relative_extension_case() { // Test that a relative path with an uppercase extension // is accepted. let f = TestFixture::new(); let b = Path::new("b/bin").with_extension("EXE"); assert_eq!(_which(&f, b).unwrap(), f.bins[4].canonicalize().unwrap()); } #[test] #[cfg(unix)] fn test_which_relative_leading_dot() { let f = TestFixture::new(); assert_eq!( _which(&f, "./b/bin").unwrap(), f.bins[3].canonicalize().unwrap() ); } #[test] #[cfg(windows)] fn test_which_relative_leading_dot() { let f = TestFixture::new(); assert_eq!( _which(&f, "./b/bin").unwrap(), f.bins[4].canonicalize().unwrap() ); } #[test] #[cfg(unix)] fn test_which_non_executable() { // Shouldn't return non-executable files. let f = TestFixture::new(); f.touch("b/another", "").unwrap(); assert!(_which(&f, "another").is_err()); } #[test] #[cfg(unix)] fn test_which_absolute_non_executable() { // Shouldn't return non-executable files, even if given an absolute path. let f = TestFixture::new(); let b = f.touch("b/another", "").unwrap(); assert!(_which(&f, b).is_err()); } #[test] #[cfg(unix)] fn test_which_relative_non_executable() { // Shouldn't return non-executable files. let f = TestFixture::new(); f.touch("b/another", "").unwrap(); assert!(_which(&f, "b/another").is_err()); } #[test] fn test_failure() { let f = TestFixture::new(); let run = || -> which::Result { let p = _which(&f, "./b/bin")?; Ok(p.into_path_buf()) }; let _ = run(); } #[test] #[cfg(windows)] fn windows_no_extension_but_executable() { let this_executable = std::env::current_exe().unwrap(); let new_name = this_executable.parent().unwrap().join("test_executable"); std::fs::copy(&this_executable, &new_name).unwrap(); let found_executable = which::which_in_global( new_name.file_name().unwrap(), Some(this_executable.parent().unwrap()), ) .unwrap() .next() .unwrap(); assert_eq!(found_executable, new_name); std::fs::remove_file(new_name).unwrap(); }