// Functions for setting and getting environment variables. #include "config.h" // IWYU pragma: keep #include #include #include #include #include #include #include #include #include #include #include #include #include #include #if HAVE_NCURSES_H #include #elif HAVE_NCURSES_CURSES_H #include #else #include #endif #if HAVE_TERM_H #include #elif HAVE_NCURSES_TERM_H #include #endif #include #include #include #include #include #include #include "builtin_bind.h" #include "common.h" #include "env.h" #include "env_universal_common.h" #include "event.h" #include "fallback.h" // IWYU pragma: keep #include "fish_version.h" #include "history.h" #include "input.h" #include "input_common.h" #include "output.h" #include "path.h" #include "proc.h" #include "reader.h" #include "sanity.h" #include "screen.h" #include "wutil.h" // IWYU pragma: keep #define DEFAULT_TERM1 "ansi" #define DEFAULT_TERM2 "dumb" /// Some configuration path environment variables. #define FISH_DATADIR_VAR L"__fish_datadir" #define FISH_SYSCONFDIR_VAR L"__fish_sysconfdir" #define FISH_HELPDIR_VAR L"__fish_help_dir" #define FISH_BIN_DIR L"__fish_bin_dir" /// At init, we read all the environment variables from this array. extern char **environ; // Limit `read` to 10 MiB (bytes not wide chars) by default. This can be overridden by the // FISH_READ_BYTE_LIMIT variable. #define READ_BYTE_LIMIT 10 * 1024 * 1024 size_t read_byte_limit = READ_BYTE_LIMIT; bool g_use_posix_spawn = false; // will usually be set to true bool curses_initialized = false; /// Does the terminal have the "eat_newline_glitch". bool term_has_xn = false; /// This is used to ensure that we don't perform any callbacks from `react_to_variable_change()` /// when we're importing environment variables in `env_init()`. That's because we don't have any /// control over the order in which the vars are imported and some of them work in combination. /// For example, `TERMINFO_DIRS` and `TERM`. If the user has set `TERM` to a custom value that is /// found in `TERMINFO_DIRS` we don't to call `handle_curses()` before we've imported the latter. static bool env_initialized = false; /// List of all locale environment variable names that might trigger (re)initializing the locale /// subsystem. static const wcstring_list_t locale_variables({L"LANG", L"LANGUAGE", L"LC_ALL", L"LC_ADDRESS", L"LC_COLLATE", L"LC_CTYPE", L"LC_IDENTIFICATION", L"LC_MEASUREMENT", L"LC_MESSAGES", L"LC_MONETARY", L"LC_NAME", L"LC_NUMERIC", L"LC_PAPER", L"LC_TELEPHONE", L"LC_TIME"}); /// List of all curses environment variable names that might trigger (re)initializing the curses /// subsystem. static const wcstring_list_t curses_variables({L"TERM", L"TERMINFO", L"TERMINFO_DIRS"}); /// List of "path" like variable names that need special handling. This includes automatic /// splitting and joining on import/export. As well as replacing empty elements, which implicitly /// refer to the CWD, with an explicit '.' in the case of PATH and CDPATH. static const wcstring_list_t colon_delimited_variable({L"PATH", L"MANPATH", L"CDPATH"}); // Some forward declarations to make it easy to logically group the code. static void init_locale(); static void init_curses(); // Struct representing one level in the function variable stack. // Only our variable stack should create and destroy these class env_node_t { friend struct var_stack_t; env_node_t(bool is_new_scope) : new_scope(is_new_scope) {} public: /// Variable table. var_table_t env; /// Does this node imply a new variable scope? If yes, all non-global variables below this one /// in the stack are invisible. If new_scope is set for the global variable node, the universe /// will explode. bool new_scope; /// Does this node contain any variables which are exported to subshells. bool exportv = false; /// Pointer to next level. std::unique_ptr next; /// Returns a pointer to the given entry if present, or NULL. const var_entry_t *find_entry(const wcstring &key); }; class variable_entry_t { wcstring value; /**< Value of the variable */ }; static pthread_mutex_t env_lock = PTHREAD_MUTEX_INITIALIZER; static bool local_scope_exports(const env_node_t *n); // A class wrapping up a variable stack // Currently there is only one variable stack in fish, // but we can imagine having separate (linked) stacks // if we introduce multiple threads of execution struct var_stack_t { // Top node on the function stack. std::unique_ptr top = NULL; // Bottom node on the function stack // This is an observer pointer env_node_t *global_env = NULL; // Exported variable array used by execv. null_terminated_array_t export_array; /// Flag for checking if we need to regenerate the exported variable array. bool has_changed_exported = true; void mark_changed_exported() { has_changed_exported = true; } void update_export_array_if_necessary(); var_stack_t() : top(new env_node_t(false)) { this->global_env = this->top.get(); } // Pushes a new node onto our stack // Optionally creates a new scope for the node void push(bool new_scope); // Pops the top node if it's not global void pop(); bool var_changed(const wcstring_list_t &vars); // Returns the next scope to search for a given node, respecting the new_scope lag // Returns NULL if we're done env_node_t *next_scope_to_search(env_node_t *node); const env_node_t *next_scope_to_search(const env_node_t *node) const; // Returns the scope used for unspecified scopes // An unspecified scope is either the topmost shadowing scope, or the global scope if none // This implements the default behavior of 'set' env_node_t *resolve_unspecified_scope(); }; void var_stack_t::push(bool new_scope) { std::unique_ptr node(new env_node_t(new_scope)); node->next = std::move(this->top); this->top = std::move(node); if (new_scope && local_scope_exports(this->top.get())) { this->mark_changed_exported(); } } /// Return true if one of the vars in the passed list was changed in the current var scope. bool var_stack_t::var_changed(const wcstring_list_t &vars) { for (auto v : vars) { if (top->env.find(v) != top->env.end()) return true; } return false; } void var_stack_t::pop() { // Don't pop the top-most, global, level. if (top.get() == this->global_env) { debug(0, _(L"Tried to pop empty environment stack.")); sanity_lose(); return; } bool locale_changed = this->var_changed(locale_variables); bool curses_changed = this->var_changed(curses_variables); if (top->new_scope) { //!OCLINT(collapsible if statements) if (top->exportv || local_scope_exports(top->next.get())) { this->mark_changed_exported(); } } // Actually do the pop! Move the top pointer into a local variable, then replace the top pointer // with the next pointer afterwards we should have a node with no next pointer, and our top // should be non-null. std::unique_ptr old_top = std::move(this->top); this->top = std::move(old_top->next); old_top->next.reset(); assert(this->top && old_top && !old_top->next); assert(this->top != NULL); for (const auto &entry_pair : old_top->env) { const var_entry_t &entry = entry_pair.second; if (entry.exportv) { this->mark_changed_exported(); break; } } if (locale_changed) init_locale(); if (curses_changed) init_curses(); } const env_node_t *var_stack_t::next_scope_to_search(const env_node_t *node) const { assert(node != NULL); if (node == this->global_env) { return NULL; } return node->new_scope ? this->global_env : node->next.get(); } env_node_t *var_stack_t::next_scope_to_search(env_node_t *node) { assert(node != NULL); if (node == this->global_env) { return NULL; } return node->new_scope ? this->global_env : node->next.get(); } env_node_t *var_stack_t::resolve_unspecified_scope() { env_node_t *node = this->top.get(); while (node && !node->new_scope) { node = node->next.get(); } return node ? node : this->global_env; } // Get the global variable stack static var_stack_t &vars_stack() { static var_stack_t global_stack; return global_stack; } /// Universal variables global instance. Initialized in env_init. static env_universal_t *s_universal_variables = NULL; /// Getter for universal variables. static env_universal_t *uvars() { return s_universal_variables; } // Helper class for storing constant strings, without needing to wrap them in a wcstring. // Comparer for const string set. struct const_string_set_comparer { bool operator()(const wchar_t *a, const wchar_t *b) { return wcscmp(a, b) < 0; } }; typedef std::set const_string_set_t; /// Table of variables that may not be set using the set command. static const_string_set_t env_read_only; static bool is_read_only(const wcstring &key) { return env_read_only.find(key.c_str()) != env_read_only.end(); } /// Table of variables whose value is dynamically calculated, such as umask, status, etc. static const_string_set_t env_electric; static bool is_electric(const wcstring &key) { return env_electric.find(key.c_str()) != env_electric.end(); } const var_entry_t *env_node_t::find_entry(const wcstring &key) { const var_entry_t *result = NULL; var_table_t::const_iterator where = env.find(key); if (where != env.end()) { result = &where->second; } return result; } /// Return the current umask value. static mode_t get_umask() { mode_t res; res = umask(0); umask(res); return res; } /// Check if the specified variable is a timezone variable. static bool var_is_timezone(const wcstring &key) { return key == L"TZ"; } /// Properly sets all timezone information. static void handle_timezone(const wchar_t *env_var_name) { debug(2, L"handle_timezone() called in response to '%ls' changing", env_var_name); const env_var_t val = env_get_string(env_var_name, ENV_EXPORT); const std::string &value = wcs2string(val); const std::string &name = wcs2string(env_var_name); debug(2, L"timezone var %s='%s'", name.c_str(), value.c_str()); if (val.empty()) { unsetenv(name.c_str()); } else { setenv(name.c_str(), value.c_str(), 1); } tzset(); } /// Some env vars contain a list of paths where an empty path element is equivalent to ".". /// Unfortunately that convention causes problems for fish scripts. So this function replaces the /// empty path element with an explicit ".". See issue #3914. static void fix_colon_delimited_var(const wcstring &var_name) { // While we auto split/join MANPATH we do not want to replace empty elements with "." (#4158). if (var_name == L"MANPATH") return; const env_var_t paths = env_get_string(var_name); if (paths.missing_or_empty()) return; bool modified = false; wcstring_list_t pathsv; wcstring_list_t new_pathsv; tokenize_variable_array(paths, pathsv); for (auto next_path : pathsv) { if (next_path.empty()) { next_path = L"."; modified = true; } new_pathsv.push_back(next_path); } if (!modified) { return; } wcstring new_val; for (size_t i = 0; i < new_pathsv.size(); i++) { new_val.append(new_pathsv[i]); if (i < new_pathsv.size() - 1) { new_val.append(ARRAY_SEP_STR); } } int scope = env_set(var_name, new_val.c_str(), ENV_USER); if (scope != ENV_OK) { debug(0, L"fix_colon_delimited_var failed unexpectedly with retval %d", scope); } } /// Check if the specified variable is a locale variable. static bool var_is_locale(const wcstring &key) { for (auto var_name : locale_variables) { if (key == var_name) { return true; } } return false; } /// Initialize the locale subsystem. static void init_locale() { // We have to make a copy because the subsequent setlocale() call to change the locale will // invalidate the pointer from the this setlocale() call. char *old_msg_locale = strdup(setlocale(LC_MESSAGES, NULL)); for (auto var_name : locale_variables) { const env_var_t val = env_get_string(var_name, ENV_EXPORT); const std::string &name = wcs2string(var_name); const std::string &value = wcs2string(val); debug(2, L"locale var %s='%s'", name.c_str(), value.c_str()); if (val.empty()) { unsetenv(name.c_str()); } else { setenv(name.c_str(), value.c_str(), 1); } } char *locale = setlocale(LC_ALL, ""); fish_setlocale(); debug(2, L"init_locale() setlocale(): '%s'", locale); const char *new_msg_locale = setlocale(LC_MESSAGES, NULL); debug(3, L"old LC_MESSAGES locale: '%s'", old_msg_locale); debug(3, L"new LC_MESSAGES locale: '%s'", new_msg_locale); #ifdef HAVE__NL_MSG_CAT_CNTR if (strcmp(old_msg_locale, new_msg_locale)) { // Make change known to GNU gettext. extern int _nl_msg_cat_cntr; _nl_msg_cat_cntr++; } #endif free(old_msg_locale); } /// Check if the specified variable is a locale variable. static bool var_is_curses(const wcstring &key) { for (auto var_name : curses_variables) { if (key == var_name) { return true; } } return false; } /// True if we think we can set the terminal title else false. static bool can_set_term_title = false; /// Returns true if we think the terminal supports setting its title. bool term_supports_setting_title() { return can_set_term_title; } /// This is a pretty lame heuristic for detecting terminals that do not support setting the /// title. If we recognise the terminal name as that of a virtual terminal, we assume it supports /// setting the title. If we recognise it as that of a console, we assume it does not support /// setting the title. Otherwise we check the ttyname and see if we believe it is a virtual /// terminal. /// /// One situation in which this breaks down is with screen, since screen supports setting the /// terminal title if the underlying terminal does so, but will print garbage on terminals that /// don't. Since we can't see the underlying terminal below screen there is no way to fix this. static const wcstring_list_t title_terms({L"xterm", L"screen", L"tmux", L"nxterm", L"rxvt"}); static bool does_term_support_setting_title() { const env_var_t term_str = env_get_string(L"TERM"); if (term_str.missing()) return false; const wchar_t *term = term_str.c_str(); bool recognized = contains(title_terms, term_str); if (!recognized) recognized = !wcsncmp(term, L"xterm-", wcslen(L"xterm-")); if (!recognized) recognized = !wcsncmp(term, L"screen-", wcslen(L"screen-")); if (!recognized) recognized = !wcsncmp(term, L"tmux-", wcslen(L"tmux-")); if (!recognized) { if (term_str == L"linux") return false; if (term_str == L"dumb") return false; char buf[PATH_MAX]; int retval = ttyname_r(STDIN_FILENO, buf, PATH_MAX); if (retval != 0 || strstr(buf, "tty") || strstr(buf, "/vc/")) return false; } return true; } /// Updates our idea of whether we support term256 and term24bit (see issue #10222). static void update_fish_color_support() { // Detect or infer term256 support. If fish_term256 is set, we respect it; // otherwise infer it from the TERM variable or use terminfo. env_var_t fish_term256 = env_get_string(L"fish_term256"); env_var_t term = env_get_string(L"TERM"); bool support_term256 = false; // default to no support if (!fish_term256.missing_or_empty()) { support_term256 = from_string(fish_term256); debug(2, L"256 color support determined by 'fish_term256'"); } else if (term.find(L"256color") != wcstring::npos) { // TERM=*256color*: Explicitly supported. support_term256 = true; debug(2, L"256 color support enabled for '256color' in TERM"); } else if (term.find(L"xterm") != wcstring::npos) { // Assume that all xterms are 256, except for OS X SnowLeopard const env_var_t prog = env_get_string(L"TERM_PROGRAM"); const env_var_t progver = env_get_string(L"TERM_PROGRAM_VERSION"); if (prog == L"Apple_Terminal" && !progver.missing_or_empty()) { // OS X Lion is version 300+, it has 256 color support if (strtod(wcs2str(progver), NULL) > 300) { support_term256 = true; debug(2, L"256 color support enabled for TERM=xterm + modern Terminal.app"); } } else { support_term256 = true; debug(2, L"256 color support enabled for TERM=xterm"); } } else if (cur_term != NULL) { // See if terminfo happens to identify 256 colors support_term256 = (max_colors >= 256); debug(2, L"256 color support: using %d colors per terminfo", max_colors); } else { debug(2, L"256 color support not enabled (yet)"); } env_var_t fish_term24bit = env_get_string(L"fish_term24bit"); bool support_term24bit; if (!fish_term24bit.missing_or_empty()) { support_term24bit = from_string(fish_term24bit); debug(2, L"'fish_term24bit' preference: 24-bit color %s", support_term24bit ? L"enabled" : L"disabled"); } else { // We don't attempt to infer term24 bit support yet. support_term24bit = false; } color_support_t support = (support_term256 ? color_support_term256 : 0) | (support_term24bit ? color_support_term24bit : 0); output_set_color_support(support); } // Try to initialize the terminfo/curses subsystem using our fallback terminal name. Do not set // `TERM` to our fallback. We're only doing this in the hope of getting a minimally functional // shell. If we launch an external command that uses TERM it should get the same value we were // given, if any. static bool initialize_curses_using_fallback(const char *term) { // If $TERM is already set to the fallback name we're about to use there isn't any point in // seeing if the fallback name can be used. const char *term_env = wcs2str(env_get_string(L"TERM")); if (!strcmp(term_env, DEFAULT_TERM1) || !strcmp(term_env, DEFAULT_TERM2)) return false; if (is_interactive_session) { debug(1, _(L"Using fallback terminal type '%s'."), term); } int err_ret; if (setupterm((char *)term, STDOUT_FILENO, &err_ret) == OK) return true; if (is_interactive_session) { debug(1, _(L"Could not set up terminal using the fallback terminal type '%s'."), term); } return false; } /// Ensure the content of the magic path env vars is reasonable. Specifically, that empty path /// elements are converted to explicit "." to make the vars easier to use in fish scripts. static void init_path_vars() { for (auto var_name : colon_delimited_variable) { fix_colon_delimited_var(var_name); } } /// Initialize the curses subsystem. static void init_curses() { for (auto var_name : curses_variables) { const env_var_t val = env_get_string(var_name, ENV_EXPORT); const std::string &name = wcs2string(var_name); const std::string &value = wcs2string(val); debug(2, L"curses var %s='%s'", name.c_str(), value.c_str()); if (val.empty()) { unsetenv(name.c_str()); } else { setenv(name.c_str(), value.c_str(), 1); } } int err_ret; if (setupterm(NULL, STDOUT_FILENO, &err_ret) == ERR) { env_var_t term = env_get_string(L"TERM"); if (is_interactive_session) { debug(1, _(L"Could not set up terminal.")); if (term.missing_or_empty()) { debug(1, _(L"TERM environment variable not set.")); } else { debug(1, _(L"TERM environment variable set to '%ls'."), term.c_str()); debug(1, _(L"Check that this terminal type is supported on this system.")); } } if (!initialize_curses_using_fallback(DEFAULT_TERM1)) { initialize_curses_using_fallback(DEFAULT_TERM2); } } can_set_term_title = does_term_support_setting_title(); term_has_xn = tigetflag((char *)"xenl") == 1; // does terminal have the eat_newline_glitch update_fish_color_support(); // Invalidate the cached escape sequences since they may no longer be valid. cached_esc_sequences.clear(); curses_initialized = true; } // Here is the whitelist of variables that we colon-delimit, both incoming from the environment and // outgoing back to it. This is deliberately very short - we don't want to add language-specific // values like CLASSPATH. static bool variable_is_colon_delimited_var(const wcstring &str) { return contains(colon_delimited_variable, str); } /// React to modifying the given variable. static void react_to_variable_change(const wcstring &key) { // Don't do any of this until `env_init()` has run. We only want to do this in response to // variables set by the user; e.g., in a script like *config.fish* or interactively. if (!env_initialized) return; if (var_is_locale(key)) { init_locale(); } else if (variable_is_colon_delimited_var(key)) { fix_colon_delimited_var(key); } else if (var_is_curses(key)) { init_curses(); init_input(); } else if (var_is_timezone(key)) { handle_timezone(key.c_str()); } else if (key == L"fish_term256" || key == L"fish_term24bit") { update_fish_color_support(); reader_react_to_color_change(); } else if (string_prefixes_string(L"fish_color_", key)) { reader_react_to_color_change(); } else if (key == L"fish_escape_delay_ms") { update_wait_on_escape_ms(); } else if (key == L"LINES" || key == L"COLUMNS") { invalidate_termsize(true); // force fish to update its idea of the terminal size plus vars } else if (key == L"FISH_READ_BYTE_LIMIT") { env_set_read_limit(); } else if (key == L"FISH_HISTORY") { history_destroy(); reader_push(history_session_id().c_str()); } } /// Universal variable callback function. This function makes sure the proper events are triggered /// when an event occurs. static void universal_callback(fish_message_type_t type, const wchar_t *name) { const wchar_t *str = NULL; switch (type) { case SET: case SET_EXPORT: { str = L"SET"; break; } case ERASE: { str = L"ERASE"; break; } } if (str) { vars_stack().mark_changed_exported(); event_t ev = event_t::variable_event(name); ev.arguments.push_back(L"VARIABLE"); ev.arguments.push_back(str); ev.arguments.push_back(name); event_fire(&ev); } if (name) react_to_variable_change(name); } /// Make sure the PATH variable contains something. static void setup_path() { const env_var_t path = env_get_string(L"PATH"); if (path.missing_or_empty()) { const wchar_t *value = L"/usr/bin" ARRAY_SEP_STR L"/bin"; env_set(L"PATH", value, ENV_GLOBAL | ENV_EXPORT); } } /// If they don't already exist initialize the `COLUMNS` and `LINES` env vars to reasonable /// defaults. They will be updated later by the `get_current_winsize()` function if they need to be /// adjusted. static void env_set_termsize() { env_var_t cols = env_get_string(L"COLUMNS"); if (cols.missing_or_empty()) env_set(L"COLUMNS", DFLT_TERM_COL_STR, ENV_GLOBAL); env_var_t rows = env_get_string(L"LINES"); if (rows.missing_or_empty()) env_set(L"LINES", DFLT_TERM_ROW_STR, ENV_GLOBAL); } bool env_set_pwd() { wcstring res = wgetcwd(); if (res.empty()) { debug(0, _(L"Could not determine current working directory. Is your locale set correctly?")); return false; } env_set(L"PWD", res.c_str(), ENV_EXPORT | ENV_GLOBAL); return true; } /// Allow the user to override the limit on how much data the `read` command will process. /// This is primarily for testing but could be used by users in special situations. void env_set_read_limit() { env_var_t read_byte_limit_var = env_get_string(L"FISH_READ_BYTE_LIMIT"); if (!read_byte_limit_var.missing_or_empty()) { size_t limit = fish_wcstoull(read_byte_limit_var.c_str()); if (errno) { debug(1, "Ignoring FISH_READ_BYTE_LIMIT since it is not valid"); } else { read_byte_limit = limit; } } } wcstring env_get_pwd_slash(void) { env_var_t pwd = env_get_string(L"PWD"); if (pwd.missing_or_empty()) { return L""; } if (!string_suffixes_string(L"/", pwd)) { pwd.push_back(L'/'); } return pwd; } /// Set up the USER variable. static void setup_user(bool force) { if (env_get_string(L"USER").missing_or_empty() || force) { struct passwd userinfo; struct passwd *result; char buf[8192]; int retval = getpwuid_r(getuid(), &userinfo, buf, sizeof(buf), &result); if (!retval && result) { const wcstring uname = str2wcstring(userinfo.pw_name); env_set(L"USER", uname.c_str(), ENV_GLOBAL | ENV_EXPORT); } } } /// Various things we need to initialize at run-time that don't really fit any of the other init /// routines. void misc_init() { env_set_read_limit(); // If stdout is open on a tty ensure stdio is unbuffered. That's because those functions might // be intermixed with `write()` calls and we need to ensure the writes are not reordered. See // issue #3748. if (isatty(STDOUT_FILENO)) { fflush(stdout); setvbuf(stdout, NULL, _IONBF, 0); } #ifdef OS_IS_CYGWIN // MS Windows tty devices do not currently have either a read or write timestamp. Those // respective fields of `struct stat` are always the current time. Which means we can't // use them. So we assume no external program has written to the terminal behind our // back. This makes multiline promptusable. See issue #2859 and // https://github.com/Microsoft/BashOnWindows/issues/545 has_working_tty_timestamps = false; #else // This covers preview builds of Windows Subsystem for Linux (WSL). FILE *procsyskosrel; if ((procsyskosrel = wfopen(L"/proc/sys/kernel/osrelease", "r"))) { wcstring osrelease; fgetws2(&osrelease, procsyskosrel); if (osrelease.find(L"3.4.0-Microsoft") != wcstring::npos) { has_working_tty_timestamps = false; } } if (procsyskosrel) { fclose(procsyskosrel); } #endif // OS_IS_MS_WINDOWS } void env_init(const struct config_paths_t *paths /* or NULL */) { // These variables can not be altered directly by the user. const wchar_t *const ro_keys[] = { L"status", L"history", L"_", L"PWD", L"FISH_VERSION", // L"SHLVL" is readonly but will be inserted below after we increment it. }; for (size_t i = 0; i < sizeof ro_keys / sizeof *ro_keys; i++) { env_read_only.insert(ro_keys[i]); } // Names of all dynamically calculated variables. env_electric.insert(L"history"); env_electric.insert(L"status"); env_electric.insert(L"umask"); // Now the environment variable handling is set up, the next step is to insert valid data. // Import environment variables. Walk backwards so that the first one out of any duplicates wins // (See issue #2784). wcstring key, val; const char *const *envp = environ; size_t i = 0; while (envp && envp[i]) { i++; } while (i--) { const wcstring key_and_val = str2wcstring(envp[i]); // like foo=bar size_t eql = key_and_val.find(L'='); if (eql == wcstring::npos) { // No equals found. if (is_read_only(key_and_val) || is_electric(key_and_val)) continue; env_set(key_and_val, L"", ENV_EXPORT | ENV_GLOBAL); } else { key.assign(key_and_val, 0, eql); if (is_read_only(key) || is_electric(key)) continue; val.assign(key_and_val, eql + 1, wcstring::npos); if (variable_is_colon_delimited_var(key)) { std::replace(val.begin(), val.end(), L':', ARRAY_SEP); } env_set(key, val.c_str(), ENV_EXPORT | ENV_GLOBAL); } } // Set the given paths in the environment, if we have any. if (paths != NULL) { env_set(FISH_DATADIR_VAR, paths->data.c_str(), ENV_GLOBAL); env_set(FISH_SYSCONFDIR_VAR, paths->sysconf.c_str(), ENV_GLOBAL); env_set(FISH_HELPDIR_VAR, paths->doc.c_str(), ENV_GLOBAL); env_set(FISH_BIN_DIR, paths->bin.c_str(), ENV_GLOBAL); } init_locale(); init_curses(); init_input(); init_path_vars(); // Set up the USER and PATH variables setup_path(); // Some `su`s keep $USER when changing to root. // This leads to issues later on (and e.g. in prompts), // so we work around it by resetting $USER. // TODO: Figure out if that su actually checks if username == "root"(as the man page says) or // UID == 0. uid_t uid = getuid(); setup_user(uid == 0); // Set up the version variable. wcstring version = str2wcstring(get_fish_version()); env_set(L"FISH_VERSION", version.c_str(), ENV_GLOBAL); // Set up SHLVL variable. const env_var_t shlvl_str = env_get_string(L"SHLVL"); wcstring nshlvl_str = L"1"; if (!shlvl_str.missing()) { const wchar_t *end; // TODO: Figure out how to handle invalid numbers better. Shouldn't we issue a diagnostic? long shlvl_i = fish_wcstol(shlvl_str.c_str(), &end); if (!errno && shlvl_i >= 0) { nshlvl_str = to_string(shlvl_i + 1); } } env_set(L"SHLVL", nshlvl_str.c_str(), ENV_GLOBAL | ENV_EXPORT); env_read_only.insert(L"SHLVL"); // Set up the HOME variable. // Unlike $USER, it doesn't seem that `su`s pass this along // if the target user is root, unless "--preserve-environment" is used. // Since that is an explicit choice, we should allow it to enable e.g. // env HOME=(mktemp -d) su --preserve-environment fish if (env_get_string(L"HOME").missing_or_empty()) { const env_var_t unam = env_get_string(L"USER"); char *unam_narrow = wcs2str(unam.c_str()); struct passwd userinfo; struct passwd *result; char buf[8192]; int retval = getpwnam_r(unam_narrow, &userinfo, buf, sizeof(buf), &result); if (retval || !result) { // Maybe USER is set but it's bogus. Reset USER from the db and try again. setup_user(true); const env_var_t unam = env_get_string(L"USER"); unam_narrow = wcs2str(unam.c_str()); retval = getpwnam_r(unam_narrow, &userinfo, buf, sizeof(buf), &result); } if (!retval && result && userinfo.pw_dir) { const wcstring dir = str2wcstring(userinfo.pw_dir); env_set(L"HOME", dir.c_str(), ENV_GLOBAL | ENV_EXPORT); } free(unam_narrow); } env_set_pwd(); // initialize the PWD variable env_set_termsize(); // initialize the terminal size variables env_set_read_limit(); // initialize the read_byte_limit // Set up universal variables. The empty string means to use the deafult path. assert(s_universal_variables == NULL); s_universal_variables = new env_universal_t(L""); s_universal_variables->load(); // Set g_use_posix_spawn. Default to true. env_var_t use_posix_spawn = env_get_string(L"fish_use_posix_spawn"); g_use_posix_spawn = (use_posix_spawn.missing_or_empty() ? true : from_string(use_posix_spawn)); // Set fish_bind_mode to "default". env_set(FISH_BIND_MODE_VAR, DEFAULT_BIND_MODE, ENV_GLOBAL); // Now that the global scope is fully initialized, add a toplevel local scope. This same local // scope will persist throughout the lifetime of the fish process, and it will ensure that `set // -l` commands run at the command-line don't affect the global scope. env_push(false); env_initialized = true; } /// Search all visible scopes in order for the specified key. Return the first scope in which it was /// found. static env_node_t *env_get_node(const wcstring &key) { env_node_t *env = vars_stack().top.get(); while (env != NULL) { if (env->find_entry(key) != NULL) { break; } env = vars_stack().next_scope_to_search(env); } return env; } /// Set the value of the environment variable whose name matches key to val. /// /// Memory policy: All keys and values are copied, the parameters can and should be freed by the /// caller afterwards /// /// \param key The key /// \param val The value /// \param var_mode The type of the variable. Can be any combination of ENV_GLOBAL, ENV_LOCAL, /// ENV_EXPORT and ENV_USER. If mode is zero, the current variable space is searched and the current /// mode is used. If no current variable with the same name is found, ENV_LOCAL is assumed. /// /// Returns: /// /// * ENV_OK on success. /// * ENV_PERM, can only be returned when setting as a user, e.g. ENV_USER is set. This means that /// the user tried to change a read-only variable. /// * ENV_SCOPE, the variable cannot be set in the given scope. This applies to readonly/electric /// variables set from the local or universal scopes, or set as exported. /// * ENV_INVALID, the variable value was invalid. This applies only to special variables. int env_set(const wcstring &key, const wchar_t *val, env_mode_flags_t var_mode) { ASSERT_IS_MAIN_THREAD(); bool has_changed_old = vars_stack().has_changed_exported; int done = 0; if (val && (key == L"PWD" || key == L"HOME")) { // Canonicalize our path; if it changes, recurse and try again. wcstring val_canonical = val; path_make_canonical(val_canonical); if (val != val_canonical) { return env_set(key, val_canonical.c_str(), var_mode); } } if ((var_mode & (ENV_LOCAL | ENV_UNIVERSAL)) && (is_read_only(key) || is_electric(key))) { return ENV_SCOPE; } if ((var_mode & ENV_EXPORT) && is_electric(key)) { return ENV_SCOPE; } if ((var_mode & ENV_USER) && is_read_only(key)) { return ENV_PERM; } if (key == L"umask") { // Set the new umask. if (val && wcslen(val)) { long mask = fish_wcstol(val, NULL, 8); if (!errno && mask <= 0777 && mask >= 0) { umask(mask); // Do not actually create a umask variable, on env_get, it will be calculated // dynamically. return ENV_OK; } } return ENV_INVALID; } // Zero element arrays are internally not coded as an empty string but this placeholder string. if (!val) { val = ENV_NULL; //!OCLINT(parameter reassignment) } if (var_mode & ENV_UNIVERSAL) { const bool old_export = uvars() && uvars()->get_export(key); bool new_export; if (var_mode & ENV_EXPORT) { // Export the var. new_export = true; } else if (var_mode & ENV_UNEXPORT) { // Unexport the var. new_export = false; } else { // Not changing the export status of the var. new_export = old_export; } if (uvars()) { uvars()->set(key, val, new_export); env_universal_barrier(); if (old_export || new_export) { vars_stack().mark_changed_exported(); } } } else { // Determine the node. bool has_changed_new = false; env_node_t *preexisting_node = env_get_node(key); bool preexisting_entry_exportv = false; if (preexisting_node != NULL) { var_table_t::const_iterator result = preexisting_node->env.find(key); assert(result != preexisting_node->env.end()); const var_entry_t &entry = result->second; if (entry.exportv) { preexisting_entry_exportv = true; has_changed_new = true; } } env_node_t *node = NULL; if (var_mode & ENV_GLOBAL) { node = vars_stack().global_env; } else if (var_mode & ENV_LOCAL) { node = vars_stack().top.get(); } else if (preexisting_node != NULL) { node = preexisting_node; if ((var_mode & (ENV_EXPORT | ENV_UNEXPORT)) == 0) { // use existing entry's exportv var_mode = //!OCLINT(parameter reassignment) preexisting_entry_exportv ? ENV_EXPORT : 0; } } else { if (!get_proc_had_barrier()) { set_proc_had_barrier(true); env_universal_barrier(); } if (uvars() && !uvars()->get(key).missing()) { bool exportv; if (var_mode & ENV_EXPORT) { exportv = true; } else if (var_mode & ENV_UNEXPORT) { exportv = false; } else { exportv = uvars()->get_export(key); } uvars()->set(key, val, exportv); env_universal_barrier(); done = 1; } else { // New variable with unspecified scope node = vars_stack().resolve_unspecified_scope(); } } if (!done) { // Set the entry in the node. Note that operator[] accesses the existing entry, or // creates a new one. var_entry_t &entry = node->env[key]; if (entry.exportv) { // This variable already existed, and was exported. has_changed_new = true; } entry.val = val; if (var_mode & ENV_EXPORT) { // The new variable is exported. entry.exportv = true; node->exportv = true; has_changed_new = true; } else { entry.exportv = false; } if (has_changed_old || has_changed_new) vars_stack().mark_changed_exported(); } } event_t ev = event_t::variable_event(key); ev.arguments.reserve(3); ev.arguments.push_back(L"VARIABLE"); ev.arguments.push_back(L"SET"); ev.arguments.push_back(key); // debug( 1, L"env_set: fire events on variable %ls", key ); event_fire(&ev); // debug( 1, L"env_set: return from event firing" ); react_to_variable_change(key); return ENV_OK; } /// Attempt to remove/free the specified key/value pair from the specified map. /// /// \return zero if the variable was not found, non-zero otherwise static bool try_remove(env_node_t *n, const wchar_t *key, int var_mode) { if (n == NULL) { return false; } var_table_t::iterator result = n->env.find(key); if (result != n->env.end()) { if (result->second.exportv) { vars_stack().mark_changed_exported(); } n->env.erase(result); return true; } if (var_mode & ENV_LOCAL) { return false; } if (n->new_scope) { return try_remove(vars_stack().global_env, key, var_mode); } return try_remove(n->next.get(), key, var_mode); } int env_remove(const wcstring &key, int var_mode) { ASSERT_IS_MAIN_THREAD(); env_node_t *first_node; int erased = 0; if ((var_mode & ENV_USER) && is_read_only(key)) { return 2; } first_node = vars_stack().top.get(); if (!(var_mode & ENV_UNIVERSAL)) { if (var_mode & ENV_GLOBAL) { first_node = vars_stack().global_env; } if (try_remove(first_node, key.c_str(), var_mode)) { event_t ev = event_t::variable_event(key); ev.arguments.push_back(L"VARIABLE"); ev.arguments.push_back(L"ERASE"); ev.arguments.push_back(key); event_fire(&ev); erased = 1; } } if (!erased && !(var_mode & ENV_GLOBAL) && !(var_mode & ENV_LOCAL)) { bool is_exported = uvars()->get_export(key); erased = uvars() && uvars()->remove(key); if (erased) { env_universal_barrier(); event_t ev = event_t::variable_event(key); ev.arguments.push_back(L"VARIABLE"); ev.arguments.push_back(L"ERASE"); ev.arguments.push_back(key); event_fire(&ev); } if (is_exported) vars_stack().mark_changed_exported(); } react_to_variable_change(key); return !erased; } const wchar_t *env_var_t::c_str(void) const { assert(!is_missing); //!OCLINT(multiple unary operator) return wcstring::c_str(); } env_var_t env_get_string(const wcstring &key, env_mode_flags_t mode) { const bool has_scope = mode & (ENV_LOCAL | ENV_GLOBAL | ENV_UNIVERSAL); const bool search_local = !has_scope || (mode & ENV_LOCAL); const bool search_global = !has_scope || (mode & ENV_GLOBAL); const bool search_universal = !has_scope || (mode & ENV_UNIVERSAL); const bool search_exported = (mode & ENV_EXPORT) || !(mode & ENV_UNEXPORT); const bool search_unexported = (mode & ENV_UNEXPORT) || !(mode & ENV_EXPORT); // Make the assumption that electric keys can't be shadowed elsewhere, since we currently block // that in env_set(). if (is_electric(key)) { if (!search_global) return env_var_t::missing_var(); if (key == L"history") { // Big hack. We only allow getting the history on the main thread. Note that history_t // may ask for an environment variable, so don't take the lock here (we don't need it). if (!is_main_thread()) { return env_var_t::missing_var(); } env_var_t result; history_t *history = reader_get_history(); if (!history) { history = &history_t::history_with_name(history_session_id()); } if (history) history->get_string_representation(&result, ARRAY_SEP_STR); return result; } else if (key == L"status") { return to_string(proc_get_last_status()); } else if (key == L"umask") { return format_string(L"0%0.3o", get_umask()); } // We should never get here unless the electric var list is out of sync with the above code. DIE("unerecognized electric var name"); } if (search_local || search_global) { /* Lock around a local region */ scoped_lock locker(env_lock); env_node_t *env = search_local ? vars_stack().top.get() : vars_stack().global_env; while (env != NULL) { const var_entry_t *entry = env->find_entry(key); if (entry != NULL && (entry->exportv ? search_exported : search_unexported)) { if (entry->val == ENV_NULL) { return env_var_t::missing_var(); } return entry->val; } if (has_scope) { if (!search_global || env == vars_stack().global_env) break; env = vars_stack().global_env; } else { env = vars_stack().next_scope_to_search(env); } } } if (!search_universal) return env_var_t::missing_var(); // Another hack. Only do a universal barrier on the main thread (since it can change variable // values). Make sure we do this outside the env_lock because it may itself call env_get_string. if (is_main_thread() && !get_proc_had_barrier()) { set_proc_had_barrier(true); env_universal_barrier(); } if (uvars()) { env_var_t env_var = uvars()->get(key); if (env_var == ENV_NULL || !(uvars()->get_export(key) ? search_exported : search_unexported)) { env_var = env_var_t::missing_var(); } return env_var; } return env_var_t::missing_var(); } bool env_exist(const wchar_t *key, env_mode_flags_t mode) { CHECK(key, false); const bool has_scope = mode & (ENV_LOCAL | ENV_GLOBAL | ENV_UNIVERSAL); const bool test_local = !has_scope || (mode & ENV_LOCAL); const bool test_global = !has_scope || (mode & ENV_GLOBAL); const bool test_universal = !has_scope || (mode & ENV_UNIVERSAL); const bool test_exported = (mode & ENV_EXPORT) || !(mode & ENV_UNEXPORT); const bool test_unexported = (mode & ENV_UNEXPORT) || !(mode & ENV_EXPORT); if (is_electric(key)) { // Electric variables all exist, and they are all global. A local or universal version can // not exist. They are also never exported. if (test_global && test_unexported) { return true; } return false; } if (test_local || test_global) { const env_node_t *env = test_local ? vars_stack().top.get() : vars_stack().global_env; while (env != NULL) { if (env == vars_stack().global_env && !test_global) { break; } var_table_t::const_iterator result = env->env.find(key); if (result != env->env.end()) { const var_entry_t &res = result->second; return res.exportv ? test_exported : test_unexported; } env = vars_stack().next_scope_to_search(env); } } if (test_universal) { if (!get_proc_had_barrier()) { set_proc_had_barrier(true); env_universal_barrier(); } if (uvars() && !uvars()->get(key).missing()) { return uvars()->get_export(key) ? test_exported : test_unexported; } } return 0; } /// Returns true if the specified scope or any non-shadowed non-global subscopes contain an exported /// variable. static bool local_scope_exports(const env_node_t *n) { assert(n != NULL); if (n == vars_stack().global_env) return false; if (n->exportv) return true; if (n->new_scope) return false; return local_scope_exports(n->next.get()); } void env_push(bool new_scope) { vars_stack().push(new_scope); } void env_pop() { vars_stack().pop(); } /// Function used with to insert keys of one table into a set::set. static void add_key_to_string_set(const var_table_t &envs, std::set *str_set, bool show_exported, bool show_unexported) { var_table_t::const_iterator iter; for (iter = envs.begin(); iter != envs.end(); ++iter) { const var_entry_t &e = iter->second; if ((e.exportv && show_exported) || (!e.exportv && show_unexported)) { // Insert this key. str_set->insert(iter->first); } } } wcstring_list_t env_get_names(int flags) { scoped_lock locker(env_lock); wcstring_list_t result; std::set names; int show_local = flags & ENV_LOCAL; int show_global = flags & ENV_GLOBAL; int show_universal = flags & ENV_UNIVERSAL; const env_node_t *n = vars_stack().top.get(); const bool show_exported = (flags & ENV_EXPORT) || !(flags & ENV_UNEXPORT); const bool show_unexported = (flags & ENV_UNEXPORT) || !(flags & ENV_EXPORT); if (!show_local && !show_global && !show_universal) { show_local = show_universal = show_global = 1; } if (show_local) { while (n) { if (n == vars_stack().global_env) break; add_key_to_string_set(n->env, &names, show_exported, show_unexported); if (n->new_scope) break; else n = n->next.get(); } } if (show_global) { add_key_to_string_set(vars_stack().global_env->env, &names, show_exported, show_unexported); if (show_unexported) { result.insert(result.end(), env_electric.begin(), env_electric.end()); } } if (show_universal && uvars()) { const wcstring_list_t uni_list = uvars()->get_names(show_exported, show_unexported); names.insert(uni_list.begin(), uni_list.end()); } result.insert(result.end(), names.begin(), names.end()); return result; } /// Get list of all exported variables. static void get_exported(const env_node_t *n, std::map *h) { if (!n) return; if (n->new_scope) get_exported(vars_stack().global_env, h); else get_exported(n->next.get(), h); var_table_t::const_iterator iter; for (iter = n->env.begin(); iter != n->env.end(); ++iter) { const wcstring &key = iter->first; const var_entry_t &val_entry = iter->second; if (val_entry.exportv && val_entry.val != ENV_NULL) { // Export the variable. Don't use std::map::insert here, since we need to overwrite // existing values from previous scopes. (*h)[key] = val_entry.val; } else { // We need to erase from the map if we are not exporting, since a lower scope may have // exported. See #2132. h->erase(key); } } } // Given a map from key to value, add values to out of the form key=value. static void export_func(const std::map &envs, std::vector &out) { out.reserve(out.size() + envs.size()); std::map::const_iterator iter; for (iter = envs.begin(); iter != envs.end(); ++iter) { const wcstring &key = iter->first; const std::string &ks = wcs2string(key); std::string vs = wcs2string(iter->second); // Arrays in the value are ASCII record separator (0x1e) delimited. But some variables // should have colons. Add those. if (variable_is_colon_delimited_var(key)) { // Replace ARRAY_SEP with colon. std::replace(vs.begin(), vs.end(), (char)ARRAY_SEP, ':'); } // Put a string on the vector. out.push_back(std::string()); std::string &str = out.back(); str.reserve(ks.size() + 1 + vs.size()); // Append our environment variable data to it. str.append(ks); str.append("="); str.append(vs); } } void var_stack_t::update_export_array_if_necessary() { if (!this->has_changed_exported) { return; } std::map vals; debug(4, L"env_export_arr() recalc"); get_exported(this->top.get(), &vals); if (uvars()) { const wcstring_list_t uni = uvars()->get_names(true, false); for (size_t i = 0; i < uni.size(); i++) { const wcstring &key = uni.at(i); const env_var_t val = uvars()->get(key); if (!val.missing() && val != ENV_NULL) { // Note that std::map::insert does NOT overwrite a value already in the map, // which we depend on here. vals.insert(std::pair(key, val)); } } } std::vector local_export_buffer; export_func(vals, local_export_buffer); export_array.set(local_export_buffer); has_changed_exported = false; } const char *const *env_export_arr() { ASSERT_IS_MAIN_THREAD(); ASSERT_IS_NOT_FORKED_CHILD(); vars_stack().update_export_array_if_necessary(); return vars_stack().export_array.get(); } void env_set_argv(const wchar_t *const *argv) { if (*argv) { const wchar_t *const *arg; wcstring sb; for (arg = argv; *arg; arg++) { if (arg != argv) { sb.append(ARRAY_SEP_STR); } sb.append(*arg); } env_set(L"argv", sb.c_str(), ENV_LOCAL); } else { env_set(L"argv", 0, ENV_LOCAL); } } env_vars_snapshot_t::env_vars_snapshot_t(const wchar_t *const *keys) { ASSERT_IS_MAIN_THREAD(); wcstring key; for (size_t i = 0; keys[i]; i++) { key.assign(keys[i]); const env_var_t val = env_get_string(key); if (!val.missing()) { vars[key] = val; } } } void env_universal_barrier() { ASSERT_IS_MAIN_THREAD(); if (uvars()) { callback_data_list_t changes; bool changed = uvars()->sync(&changes); if (changed) { universal_notifier_t::default_notifier().post_notification(); } // Post callbacks. for (size_t i = 0; i < changes.size(); i++) { const callback_data_t &data = changes.at(i); universal_callback(data.type, data.key.c_str()); } } } env_vars_snapshot_t::env_vars_snapshot_t() {} // The "current" variables are not a snapshot at all, but instead trampoline to env_get_string, etc. // We identify the current snapshot based on pointer values. static const env_vars_snapshot_t sCurrentSnapshot; const env_vars_snapshot_t &env_vars_snapshot_t::current() { return sCurrentSnapshot; } bool env_vars_snapshot_t::is_current() const { return this == &sCurrentSnapshot; } env_var_t env_vars_snapshot_t::get(const wcstring &key) const { // If we represent the current state, bounce to env_get_string. if (this->is_current()) { return env_get_string(key); } std::map::const_iterator iter = vars.find(key); return iter == vars.end() ? env_var_t::missing_var() : env_var_t(iter->second); } const wchar_t *const env_vars_snapshot_t::highlighting_keys[] = {L"PATH", L"CDPATH", L"fish_function_path", NULL}; const wchar_t *const env_vars_snapshot_t::completing_keys[] = {L"PATH", L"CDPATH", NULL}; // The next set of functions convert between a flat string and an actual list of strings using // the encoding employed by fish internally for "arrays". std::unique_ptr list_to_array_val(const wcstring_list_t &list) { auto val = std::unique_ptr(new wcstring()); if (list.size() == 0) { // Zero element arrays are internally encoded as this placeholder string. val->append(ENV_NULL); } else { bool need_sep = false; for (auto it : list) { if (need_sep) { val->push_back(ARRAY_SEP); } else { need_sep = true; } val->append(it); } } return val; } std::unique_ptr list_to_array_val(const wchar_t **list) { auto val = std::unique_ptr(new wcstring()); if (!*list) { // Zero element arrays are internally encoded as this placeholder string. val->append(ENV_NULL); } else { for (auto it = list; *it; it++) { if (it != list) val->push_back(ARRAY_SEP); val->append(*it); } } return val; } void tokenize_variable_array(const wcstring &val, wcstring_list_t &out) { out.clear(); // ensure the output var is empty -- this will normally be a no-op // Zero element arrays are internally encoded as this placeholder string. if (val == ENV_NULL) return; size_t pos = 0, end = val.size(); while (pos <= end) { size_t next_pos = val.find(ARRAY_SEP, pos); if (next_pos == wcstring::npos) { next_pos = end; } out.resize(out.size() + 1); out.back().assign(val, pos, next_pos - pos); pos = next_pos + 1; // skip the separator, or skip past the end } }