2016-05-03 03:31:33 +08:00
|
|
|
// Provides the "linkage" between a parse_node_tree_t and actual execution structures (job_t, etc.)
|
|
|
|
//
|
|
|
|
// A note on error handling: fish has two kind of errors, fatal parse errors non-fatal runtime
|
|
|
|
// errors. A fatal error prevents execution of the entire file, while a non-fatal error skips that
|
|
|
|
// job.
|
|
|
|
//
|
|
|
|
// Non-fatal errors are printed as soon as they are encountered; otherwise you would have to wait
|
|
|
|
// for the execution to finish to see them.
|
2016-05-19 06:30:21 +08:00
|
|
|
#include "config.h" // IWYU pragma: keep
|
|
|
|
|
2015-07-25 23:14:25 +08:00
|
|
|
#include <errno.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <termios.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <wchar.h>
|
|
|
|
#include <wctype.h>
|
2016-07-06 13:33:32 +08:00
|
|
|
|
|
|
|
#include <algorithm>
|
2016-04-21 14:00:54 +08:00
|
|
|
#include <memory>
|
2016-05-03 03:31:33 +08:00
|
|
|
#include <string>
|
2017-02-11 10:47:02 +08:00
|
|
|
#include <type_traits>
|
2015-07-25 23:14:25 +08:00
|
|
|
#include <vector>
|
2016-04-21 14:00:54 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
#include "builtin.h"
|
2017-06-16 08:57:37 +08:00
|
|
|
#include "builtin_function.h"
|
2016-05-03 03:31:33 +08:00
|
|
|
#include "common.h"
|
|
|
|
#include "complete.h"
|
2015-07-25 23:14:25 +08:00
|
|
|
#include "env.h"
|
|
|
|
#include "event.h"
|
2016-05-03 03:31:33 +08:00
|
|
|
#include "exec.h"
|
2013-12-25 05:17:24 +08:00
|
|
|
#include "expand.h"
|
2015-07-25 23:14:25 +08:00
|
|
|
#include "function.h"
|
2016-04-21 14:00:54 +08:00
|
|
|
#include "io.h"
|
2017-09-09 12:14:26 +08:00
|
|
|
#include "maybe.h"
|
2016-04-21 14:00:54 +08:00
|
|
|
#include "parse_constants.h"
|
2016-05-03 03:31:33 +08:00
|
|
|
#include "parse_execution.h"
|
2016-04-21 14:00:54 +08:00
|
|
|
#include "parse_tree.h"
|
2016-05-03 03:31:33 +08:00
|
|
|
#include "parse_util.h"
|
|
|
|
#include "parser.h"
|
|
|
|
#include "path.h"
|
2016-04-21 14:00:54 +08:00
|
|
|
#include "proc.h"
|
2016-05-03 03:31:33 +08:00
|
|
|
#include "reader.h"
|
|
|
|
#include "tokenizer.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "wildcard.h"
|
|
|
|
#include "wutil.h"
|
2013-12-25 05:17:24 +08:00
|
|
|
|
2018-01-14 17:17:57 +08:00
|
|
|
namespace g = grammar;
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
/// These are the specific statement types that support redirections.
|
|
|
|
static bool specific_statement_type_is_redirectable_block(const parse_node_t &node) {
|
|
|
|
return node.type == symbol_block_statement || node.type == symbol_if_statement ||
|
|
|
|
node.type == symbol_switch_statement;
|
2014-01-08 02:45:36 +08:00
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
/// Get the name of a redirectable block, for profiling purposes.
|
|
|
|
static wcstring profiling_cmd_name_for_redirectable_block(const parse_node_t &node,
|
|
|
|
const parse_node_tree_t &tree,
|
|
|
|
const wcstring &src) {
|
2014-02-10 06:04:43 +08:00
|
|
|
assert(specific_statement_type_is_redirectable_block(node));
|
|
|
|
assert(node.has_source());
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the source for the block, and cut it at the next statement terminator.
|
2014-02-10 06:04:43 +08:00
|
|
|
const size_t src_start = node.source_start;
|
|
|
|
size_t src_len = node.source_length;
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
const parse_node_tree_t::parse_node_list_t statement_terminator_nodes =
|
|
|
|
tree.find_nodes(node, parse_token_type_end, 1);
|
|
|
|
if (!statement_terminator_nodes.empty()) {
|
2014-02-10 06:04:43 +08:00
|
|
|
const parse_node_t *term = statement_terminator_nodes.at(0);
|
|
|
|
assert(term->source_start >= src_start);
|
|
|
|
src_len = term->source_start - src_start;
|
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2014-02-10 06:04:43 +08:00
|
|
|
wcstring result = wcstring(src, src_start, src_len);
|
|
|
|
result.append(L"...");
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2017-12-23 06:40:15 +08:00
|
|
|
parse_execution_context_t::parse_execution_context_t(parsed_source_ref_t pstree, parser_t *p,
|
|
|
|
int initial_eval_level)
|
|
|
|
: pstree(std::move(pstree)), parser(p), eval_level(initial_eval_level) {}
|
2013-12-25 05:17:24 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Utilities
|
2013-12-25 05:17:24 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
wcstring parse_execution_context_t::get_source(const parse_node_t &node) const {
|
2017-12-23 06:40:15 +08:00
|
|
|
return node.get_source(pstree->src);
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
const parse_node_t *parse_execution_context_t::get_child(const parse_node_t &parent,
|
|
|
|
node_offset_t which,
|
|
|
|
parse_token_type_t expected_type) const {
|
2017-12-23 06:40:15 +08:00
|
|
|
return this->tree().get_child(parent, which, expected_type);
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
node_offset_t parse_execution_context_t::get_offset(const parse_node_t &node) const {
|
|
|
|
// Get the offset of a node via pointer arithmetic, very hackish.
|
2013-12-25 05:17:24 +08:00
|
|
|
const parse_node_t *addr = &node;
|
2017-12-23 06:40:15 +08:00
|
|
|
const parse_node_t *base = &this->tree().at(0);
|
2013-12-25 05:17:24 +08:00
|
|
|
assert(addr >= base);
|
2014-03-26 11:06:34 +08:00
|
|
|
node_offset_t offset = static_cast<node_offset_t>(addr - base);
|
2017-12-23 06:40:15 +08:00
|
|
|
assert(offset < this->tree().size());
|
|
|
|
assert(&tree().at(offset) == &node);
|
2013-12-25 05:17:24 +08:00
|
|
|
return offset;
|
|
|
|
}
|
|
|
|
|
2018-01-14 17:26:28 +08:00
|
|
|
tnode_t<g::plain_statement> parse_execution_context_t::infinite_recursive_statement_in_job_list(
|
|
|
|
tnode_t<g::job_list> job_list, wcstring *out_func_name) const {
|
2016-05-03 03:31:33 +08:00
|
|
|
// This is a bit fragile. It is a test to see if we are inside of function call, but not inside
|
|
|
|
// a block in that function call. If, in the future, the rules for what block scopes are pushed
|
|
|
|
// on function invocation changes, then this check will break.
|
2014-01-02 07:29:56 +08:00
|
|
|
const block_t *current = parser->block_at_index(0), *parent = parser->block_at_index(1);
|
2016-05-03 03:31:33 +08:00
|
|
|
bool is_within_function_call =
|
|
|
|
(current && parent && current->type() == TOP && parent->type() == FUNCTION_CALL);
|
|
|
|
if (!is_within_function_call) {
|
2018-01-14 07:36:14 +08:00
|
|
|
return {};
|
2014-01-02 07:29:56 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Check to see which function call is forbidden.
|
|
|
|
if (parser->forbidden_function.empty()) {
|
2018-01-14 07:36:14 +08:00
|
|
|
return {};
|
2014-01-02 07:29:56 +08:00
|
|
|
}
|
|
|
|
const wcstring &forbidden_function_name = parser->forbidden_function.back();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the first job in the job list.
|
2018-01-14 17:26:28 +08:00
|
|
|
auto first_job = job_list.next_in_list<g::job>();
|
|
|
|
if (!first_job) {
|
2018-01-14 07:36:14 +08:00
|
|
|
return {};
|
2014-01-02 07:29:56 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Here's the statement node we find that's infinite recursive.
|
2018-01-14 07:36:14 +08:00
|
|
|
tnode_t<grammar::plain_statement> infinite_recursive_statement;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the list of statements.
|
|
|
|
const parse_node_tree_t::parse_node_list_t statements =
|
2017-12-23 06:40:15 +08:00
|
|
|
tree().specific_statements_for_job(*first_job);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Find all the decorated statements. We are interested in statements with no decoration (i.e.
|
|
|
|
// not command, not builtin) whose command expands to the forbidden function.
|
|
|
|
for (size_t i = 0; i < statements.size(); i++) {
|
|
|
|
// We only care about decorated statements, not while statements, etc.
|
2014-01-02 07:29:56 +08:00
|
|
|
const parse_node_t &statement = *statements.at(i);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (statement.type != symbol_decorated_statement) {
|
2014-01-02 07:29:56 +08:00
|
|
|
continue;
|
|
|
|
}
|
2018-01-14 07:36:14 +08:00
|
|
|
tnode_t<grammar::decorated_statement> dec_statement(&tree(), &statement);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2018-01-14 07:36:14 +08:00
|
|
|
auto plain_statement = tree().find_child<grammar::plain_statement>(dec_statement);
|
2018-01-14 08:43:12 +08:00
|
|
|
if (get_decoration(plain_statement) != parse_statement_decoration_none) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// This statement has a decoration like 'builtin' or 'command', and therefore is not
|
|
|
|
// infinite recursion. In particular this is what enables 'wrapper functions'.
|
2014-01-02 07:29:56 +08:00
|
|
|
continue;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Ok, this is an undecorated plain statement. Get and expand its command.
|
2018-01-14 07:36:14 +08:00
|
|
|
maybe_t<wcstring> cmd = command_for_plain_statement(plain_statement, pstree->src);
|
|
|
|
if (cmd && expand_one(*cmd, EXPAND_SKIP_CMDSUBST | EXPAND_SKIP_VARIABLES, NULL) &&
|
2016-05-03 03:31:33 +08:00
|
|
|
cmd == forbidden_function_name) {
|
|
|
|
// This is it.
|
2018-01-14 07:36:14 +08:00
|
|
|
infinite_recursive_statement = plain_statement;
|
2016-05-03 03:31:33 +08:00
|
|
|
if (out_func_name != NULL) {
|
2014-01-02 07:29:56 +08:00
|
|
|
*out_func_name = forbidden_function_name;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return infinite_recursive_statement;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
enum process_type_t parse_execution_context_t::process_type_for_command(
|
2018-01-16 07:15:45 +08:00
|
|
|
tnode_t<grammar::plain_statement> statement, const wcstring &cmd) const {
|
2014-01-01 06:37:37 +08:00
|
|
|
enum process_type_t process_type = EXTERNAL;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Determine the process type, which depends on the statement decoration (command, builtin,
|
|
|
|
// etc).
|
2018-01-16 07:15:45 +08:00
|
|
|
enum parse_statement_decoration_t decoration = get_decoration(statement);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (decoration == parse_statement_decoration_exec) {
|
|
|
|
// Always exec.
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = INTERNAL_EXEC;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (decoration == parse_statement_decoration_command) {
|
|
|
|
// Always a command.
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = EXTERNAL;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (decoration == parse_statement_decoration_builtin) {
|
|
|
|
// What happens if this builtin is not valid?
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = INTERNAL_BUILTIN;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (function_exists(cmd)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = INTERNAL_FUNCTION;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (builtin_exists(cmd)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = INTERNAL_BUILTIN;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = EXTERNAL;
|
|
|
|
}
|
|
|
|
return process_type;
|
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
bool parse_execution_context_t::should_cancel_execution(const block_t *block) const {
|
2013-12-30 08:23:26 +08:00
|
|
|
return cancellation_reason(block) != execution_cancellation_none;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_context_t::execution_cancellation_reason_t
|
|
|
|
parse_execution_context_t::cancellation_reason(const block_t *block) const {
|
|
|
|
if (shell_is_exiting()) {
|
2013-12-30 08:23:26 +08:00
|
|
|
return execution_cancellation_exit;
|
2016-05-05 06:19:47 +08:00
|
|
|
}
|
|
|
|
if (parser && parser->cancellation_requested) {
|
2014-01-03 04:37:50 +08:00
|
|
|
return execution_cancellation_skip;
|
2016-05-05 06:19:47 +08:00
|
|
|
}
|
|
|
|
if (block && block->skip) {
|
2013-12-30 08:23:26 +08:00
|
|
|
return execution_cancellation_skip;
|
|
|
|
}
|
2017-01-22 06:15:03 +08:00
|
|
|
if (block && block->loop_status != LOOP_NORMAL) {
|
|
|
|
return execution_cancellation_loop_control;
|
|
|
|
}
|
2016-05-05 06:19:47 +08:00
|
|
|
return execution_cancellation_none;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
/// Return whether the job contains a single statement, of block type, with no redirections.
|
|
|
|
bool parse_execution_context_t::job_is_simple_block(const parse_node_t &job_node) const {
|
2014-01-08 02:45:36 +08:00
|
|
|
assert(job_node.type == symbol_job);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Must have one statement.
|
2014-01-08 02:45:36 +08:00
|
|
|
const parse_node_t &statement = *get_child(job_node, 0, symbol_statement);
|
|
|
|
const parse_node_t &specific_statement = *get_child(statement, 0);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!specific_statement_type_is_redirectable_block(specific_statement)) {
|
|
|
|
// Not an appropriate block type.
|
2014-01-08 02:45:36 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Must be no pipes.
|
2014-01-08 02:45:36 +08:00
|
|
|
const parse_node_t &continuation = *get_child(job_node, 1, symbol_job_continuation);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (continuation.child_count > 0) {
|
|
|
|
// Multiple statements in this job, so there's pipes involved.
|
2014-01-08 02:45:36 +08:00
|
|
|
return false;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Check for arguments and redirections. All of the above types have an arguments / redirections
|
|
|
|
// list. It must be empty.
|
|
|
|
const parse_node_t &args_and_redirections =
|
2017-12-23 06:40:15 +08:00
|
|
|
tree().find_child(specific_statement, symbol_arguments_or_redirections_list);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (args_and_redirections.child_count > 0) {
|
|
|
|
// Non-empty, we have an argument or redirection.
|
2014-01-08 02:45:36 +08:00
|
|
|
return false;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Ok, we are a simple block!
|
2014-01-08 02:45:36 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_if_statement(
|
2018-01-14 18:02:02 +08:00
|
|
|
tnode_t<g::if_statement> statement) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Push an if block.
|
2017-01-22 07:35:35 +08:00
|
|
|
if_block_t *ib = parser->push_block<if_block_t>();
|
2018-01-14 18:02:02 +08:00
|
|
|
ib->node_offset = this->get_offset(*statement);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t result = parse_execution_success;
|
2013-12-27 17:38:43 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// We have a sequence of if clauses, with a final else, resulting in a single job list that we
|
|
|
|
// execute.
|
2018-01-14 18:02:02 +08:00
|
|
|
tnode_t<g::job_list> job_list_to_execute;
|
|
|
|
tnode_t<g::if_clause> if_clause = statement.child<0>();
|
|
|
|
tnode_t<g::else_clause> else_clause = statement.child<1>();
|
2016-05-03 03:31:33 +08:00
|
|
|
for (;;) {
|
|
|
|
if (should_cancel_execution(ib)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
result = parse_execution_cancelled;
|
|
|
|
break;
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
|
|
|
|
// An if condition has a job and a "tail" of andor jobs, e.g. "foo ; and bar; or baz".
|
2018-01-14 18:02:02 +08:00
|
|
|
tnode_t<g::job> condition_head = if_clause.child<1>();
|
|
|
|
tnode_t<g::andor_job_list> condition_boolean_tail = if_clause.child<3>();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Check the condition and the tail. We treat parse_execution_errored here as failure, in
|
|
|
|
// accordance with historic behavior.
|
2015-12-20 06:45:45 +08:00
|
|
|
parse_execution_result_t cond_ret = run_1_job(condition_head, ib);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (cond_ret == parse_execution_success) {
|
2015-12-20 06:45:45 +08:00
|
|
|
cond_ret = run_job_list(condition_boolean_tail, ib);
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
const bool take_branch =
|
|
|
|
(cond_ret == parse_execution_success) && proc_get_last_status() == EXIT_SUCCESS;
|
2014-01-01 06:37:37 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (take_branch) {
|
|
|
|
// Condition succeeded.
|
2018-01-14 18:02:02 +08:00
|
|
|
job_list_to_execute = if_clause.child<4>();
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
2018-01-14 18:02:02 +08:00
|
|
|
}
|
|
|
|
auto else_cont = else_clause.try_get_child<g::else_continuation, 1>();
|
|
|
|
if (!else_cont) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// 'if' condition failed, no else clause, return 0, we're done.
|
2017-05-04 15:18:02 +08:00
|
|
|
proc_set_last_status(STATUS_CMD_OK);
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
|
|
|
// We have an 'else continuation' (either else-if or else).
|
2018-01-14 18:02:02 +08:00
|
|
|
if (auto maybe_if_clause = else_cont.try_get_child<g::if_clause, 0>()) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// it's an 'else if', go to the next one.
|
2015-12-16 06:59:03 +08:00
|
|
|
if_clause = maybe_if_clause;
|
2018-01-14 18:02:02 +08:00
|
|
|
else_clause = else_cont.try_get_child<g::else_clause, 1>();
|
|
|
|
assert(else_clause && "Expected to have an else clause");
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
|
|
|
// It's the final 'else', we're done.
|
2018-01-14 18:02:02 +08:00
|
|
|
job_list_to_execute = else_cont.try_get_child<g::job_list, 1>();
|
|
|
|
assert(job_list_to_execute && "Should have a job list");
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Execute any job list we got.
|
|
|
|
if (job_list_to_execute != NULL) {
|
2013-12-29 08:18:38 +08:00
|
|
|
run_job_list(*job_list_to_execute, ib);
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
|
|
|
// No job list means no sucessful conditions, so return 0 (issue #1443).
|
2017-05-04 15:18:02 +08:00
|
|
|
proc_set_last_status(STATUS_CMD_OK);
|
2015-01-21 15:44:49 +08:00
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// It's possible there's a last-minute cancellation (issue #1297).
|
|
|
|
if (should_cancel_execution(ib)) {
|
2014-02-12 17:39:06 +08:00
|
|
|
result = parse_execution_cancelled;
|
|
|
|
}
|
2013-12-27 17:38:43 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Done
|
2013-12-27 17:38:43 +08:00
|
|
|
parser->pop_block(ib);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Otherwise, take the exit status of the job list. Reversal of issue #1061.
|
2014-01-01 06:37:37 +08:00
|
|
|
return result;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_begin_statement(
|
2018-01-16 02:58:03 +08:00
|
|
|
tnode_t<g::begin_header> header, tnode_t<g::job_list> contents) {
|
2017-01-22 07:35:35 +08:00
|
|
|
// Basic begin/end block. Push a scope block, run jobs, pop it
|
|
|
|
scope_block_t *sb = parser->push_block<scope_block_t>(BEGIN);
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t ret = run_job_list(contents, sb);
|
2013-12-27 17:38:43 +08:00
|
|
|
parser->pop_block(sb);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
return ret;
|
2014-01-15 17:40:40 +08:00
|
|
|
}
|
2013-12-27 17:38:43 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Define a function.
|
|
|
|
parse_execution_result_t parse_execution_context_t::run_function_statement(
|
2018-01-14 18:45:27 +08:00
|
|
|
tnode_t<g::function_header> header, tnode_t<g::end_command> block_end_command) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get arguments.
|
2018-01-16 07:15:45 +08:00
|
|
|
wcstring_list_t arguments;
|
|
|
|
argument_node_list_t arg_nodes = header.descendants<g::argument>();
|
|
|
|
parse_execution_result_t result =
|
|
|
|
this->expand_arguments_from_nodes(arg_nodes, &arguments, failglob);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
if (result != parse_execution_success) {
|
|
|
|
return result;
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
// The function definition extends from the end of the header to the function end. It's not
|
|
|
|
// just the range of the contents because that loses comments - see issue #1710.
|
|
|
|
assert(block_end_command.has_source());
|
2018-01-14 18:45:27 +08:00
|
|
|
auto header_range = header.source_range();
|
|
|
|
size_t contents_start = header_range->start + header_range->length;
|
|
|
|
size_t contents_end = block_end_command.source_range()
|
|
|
|
->start; // 1 past the last character in the function definition
|
2016-10-31 11:26:10 +08:00
|
|
|
assert(contents_end >= contents_start);
|
|
|
|
|
|
|
|
// Swallow whitespace at both ends.
|
2017-12-23 06:40:15 +08:00
|
|
|
while (contents_start < contents_end && iswspace(pstree->src.at(contents_start))) {
|
2016-10-31 11:26:10 +08:00
|
|
|
contents_start++;
|
|
|
|
}
|
2017-12-23 06:40:15 +08:00
|
|
|
while (contents_start < contents_end && iswspace(pstree->src.at(contents_end - 1))) {
|
2016-10-31 11:26:10 +08:00
|
|
|
contents_end--;
|
|
|
|
}
|
|
|
|
|
|
|
|
assert(contents_end >= contents_start);
|
|
|
|
const wcstring contents_str =
|
2017-12-23 06:40:15 +08:00
|
|
|
wcstring(pstree->src, contents_start, contents_end - contents_start);
|
2016-10-31 11:26:10 +08:00
|
|
|
int definition_line_offset = this->line_offset_of_character_at_offset(contents_start);
|
2017-07-27 11:17:04 +08:00
|
|
|
io_streams_t streams(0); // no limit on the amount of output from builtin_function()
|
2018-01-16 07:15:45 +08:00
|
|
|
int err = builtin_function(*parser, streams, arguments, contents_str, definition_line_offset);
|
2016-10-31 11:26:10 +08:00
|
|
|
proc_set_last_status(err);
|
|
|
|
|
2017-06-18 13:36:56 +08:00
|
|
|
if (!streams.err.empty()) {
|
|
|
|
this->report_error(header, L"%ls", streams.err.buffer().c_str());
|
2016-10-31 11:26:10 +08:00
|
|
|
result = parse_execution_errored;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
2016-10-31 11:26:10 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
return result;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_block_statement(
|
2018-01-14 17:42:58 +08:00
|
|
|
tnode_t<g::block_statement> statement) {
|
|
|
|
tnode_t<g::block_header> bheader = statement.child<0>();
|
|
|
|
tnode_t<g::job_list> contents = statement.child<1>();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t ret = parse_execution_success;
|
2018-01-14 17:42:58 +08:00
|
|
|
if (auto header = bheader.try_get_child<g::for_header, 0>()) {
|
|
|
|
ret = run_for_statement(header, contents);
|
|
|
|
} else if (auto header = bheader.try_get_child<g::while_header, 0>()) {
|
|
|
|
ret = run_while_statement(header, contents);
|
|
|
|
} else if (auto header = bheader.try_get_child<g::function_header, 0>()) {
|
|
|
|
tnode_t<g::end_command> func_end = statement.child<2>();
|
|
|
|
ret = run_function_statement(header, func_end);
|
|
|
|
} else if (auto header = bheader.try_get_child<g::begin_header, 0>()) {
|
|
|
|
ret = run_begin_statement(header, contents);
|
|
|
|
} else {
|
|
|
|
debug(0, L"Unexpected block header: %ls\n", bheader.node()->describe().c_str());
|
|
|
|
PARSER_DIE();
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
2014-01-01 06:37:37 +08:00
|
|
|
return ret;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
|
|
|
|
2017-09-09 12:14:26 +08:00
|
|
|
/// Return true if the current execution context is within a function block, else false.
|
|
|
|
bool parse_execution_context_t::is_function_context() const {
|
|
|
|
const block_t *current = parser->block_at_index(0);
|
|
|
|
const block_t *parent = parser->block_at_index(1);
|
|
|
|
bool is_within_function_call =
|
|
|
|
(current && parent && current->type() == TOP && parent->type() == FUNCTION_CALL);
|
|
|
|
return is_within_function_call;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_for_statement(
|
2018-01-14 17:47:09 +08:00
|
|
|
tnode_t<grammar::for_header> header, tnode_t<grammar::job_list> block_contents) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the variable name: `for var_name in ...`. We expand the variable name. It better result
|
|
|
|
// in just one.
|
2018-01-14 17:47:09 +08:00
|
|
|
tnode_t<g::tok_string> var_name_node = header.child<1>();
|
2014-02-22 10:20:51 +08:00
|
|
|
wcstring for_var_name = get_source(var_name_node);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!expand_one(for_var_name, 0, NULL)) {
|
2014-02-22 10:20:51 +08:00
|
|
|
report_error(var_name_node, FAILED_EXPANSION_VARIABLE_NAME_ERR_MSG, for_var_name.c_str());
|
|
|
|
return parse_execution_errored;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the contents to iterate over.
|
2018-01-16 07:15:45 +08:00
|
|
|
wcstring_list_t arguments;
|
|
|
|
parse_execution_result_t ret = this->expand_arguments_from_nodes(
|
|
|
|
get_argument_nodes(header.child<3>()), &arguments, nullglob);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (ret != parse_execution_success) {
|
2014-06-01 03:41:27 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-09-09 12:14:26 +08:00
|
|
|
auto var = env_get(for_var_name, ENV_LOCAL);
|
|
|
|
if (!var && !is_function_context()) var = env_get(for_var_name, ENV_DEFAULT);
|
|
|
|
if (!var || var->read_only()) {
|
|
|
|
int retval = env_set_empty(for_var_name, ENV_LOCAL | ENV_USER);
|
|
|
|
if (retval != ENV_OK) {
|
|
|
|
report_error(var_name_node, L"You cannot use read-only variable '%ls' in a for loop",
|
|
|
|
for_var_name.c_str());
|
|
|
|
return parse_execution_errored;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-22 07:35:35 +08:00
|
|
|
for_block_t *fb = parser->push_block<for_block_t>();
|
2013-12-27 17:38:43 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Now drive the for loop.
|
2018-01-16 07:15:45 +08:00
|
|
|
for (const wcstring &val : arguments) {
|
2016-05-03 03:31:33 +08:00
|
|
|
if (should_cancel_execution(fb)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
ret = parse_execution_cancelled;
|
2014-01-01 16:04:02 +08:00
|
|
|
break;
|
2014-01-01 06:37:37 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-09-09 12:14:26 +08:00
|
|
|
int retval = env_set_one(for_var_name, ENV_DEFAULT | ENV_USER, val);
|
2017-12-22 05:53:18 +08:00
|
|
|
assert(retval == ENV_OK && "for loop variable should have been successfully set");
|
|
|
|
(void)retval;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-08-21 03:02:45 +08:00
|
|
|
fb->loop_status = LOOP_NORMAL;
|
2013-12-29 08:18:38 +08:00
|
|
|
this->run_job_list(block_contents, fb);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (this->cancellation_reason(fb) == execution_cancellation_loop_control) {
|
|
|
|
// Handle break or continue.
|
|
|
|
if (fb->loop_status == LOOP_CONTINUE) {
|
|
|
|
// Reset the loop state.
|
2013-12-30 08:23:26 +08:00
|
|
|
fb->loop_status = LOOP_NORMAL;
|
|
|
|
continue;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (fb->loop_status == LOOP_BREAK) {
|
2013-12-30 08:23:26 +08:00
|
|
|
break;
|
|
|
|
}
|
2013-12-29 14:52:06 +08:00
|
|
|
}
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-08 02:45:36 +08:00
|
|
|
parser->pop_block(fb);
|
2014-01-01 06:37:37 +08:00
|
|
|
return ret;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_switch_statement(
|
2018-01-14 18:30:18 +08:00
|
|
|
tnode_t<grammar::switch_statement> statement) {
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t result = parse_execution_success;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the switch variable.
|
2018-01-14 18:30:18 +08:00
|
|
|
tnode_t<grammar::argument> switch_value_n = statement.child<1>();
|
|
|
|
const wcstring switch_value = get_source(switch_value_n);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Expand it. We need to offset any errors by the position of the string.
|
2013-12-27 19:58:42 +08:00
|
|
|
std::vector<completion_t> switch_values_expanded;
|
2014-03-22 08:13:33 +08:00
|
|
|
parse_error_list_t errors;
|
2016-05-03 03:31:33 +08:00
|
|
|
int expand_ret =
|
|
|
|
expand_string(switch_value, &switch_values_expanded, EXPAND_NO_DESCRIPTIONS, &errors);
|
2018-01-14 18:30:18 +08:00
|
|
|
parse_error_offset_source_start(&errors, switch_value_n.source_range()->start);
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
switch (expand_ret) {
|
|
|
|
case EXPAND_ERROR: {
|
2014-03-22 08:13:33 +08:00
|
|
|
result = report_errors(errors);
|
2013-12-27 19:58:42 +08:00
|
|
|
break;
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
case EXPAND_WILDCARD_NO_MATCH: {
|
2018-01-14 18:30:18 +08:00
|
|
|
result = report_unmatched_wildcard_error(switch_value_n);
|
2013-12-27 19:58:42 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case EXPAND_WILDCARD_MATCH:
|
2016-05-03 03:31:33 +08:00
|
|
|
case EXPAND_OK: {
|
2013-12-27 19:58:42 +08:00
|
|
|
break;
|
|
|
|
}
|
2016-10-30 08:25:48 +08:00
|
|
|
default: {
|
|
|
|
DIE("unexpected expand_string() return value");
|
|
|
|
break;
|
|
|
|
}
|
2013-12-27 19:58:42 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (result == parse_execution_success && switch_values_expanded.size() != 1) {
|
|
|
|
result =
|
2018-01-14 18:30:18 +08:00
|
|
|
report_error(switch_value_n, _(L"switch: Expected exactly one argument, got %lu\n"),
|
2016-05-03 03:31:33 +08:00
|
|
|
switch_values_expanded.size());
|
2013-12-27 19:58:42 +08:00
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
if (result != parse_execution_success) {
|
|
|
|
return result;
|
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
const wcstring &switch_value_expanded = switch_values_expanded.at(0).completion;
|
2014-03-29 07:56:44 +08:00
|
|
|
|
2017-01-22 07:35:35 +08:00
|
|
|
switch_block_t *sb = parser->push_block<switch_block_t>();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
// Expand case statements.
|
2018-01-14 18:30:18 +08:00
|
|
|
tnode_t<g::case_item_list> case_item_list = statement.child<3>();
|
|
|
|
tnode_t<g::case_item> matching_case_item{};
|
|
|
|
while (auto case_item = case_item_list.next_in_list<g::case_item>()) {
|
2016-10-31 11:26:10 +08:00
|
|
|
if (should_cancel_execution(sb)) {
|
|
|
|
result = parse_execution_cancelled;
|
|
|
|
break;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
// Expand arguments. A case item list may have a wildcard that fails to expand to
|
|
|
|
// anything. We also report case errors, but don't stop execution; i.e. a case item that
|
|
|
|
// contains an unexpandable process will report and then fail to match.
|
2018-01-16 07:15:45 +08:00
|
|
|
auto arg_nodes = get_argument_nodes(case_item.child<1>());
|
2016-10-31 11:26:10 +08:00
|
|
|
wcstring_list_t case_args;
|
|
|
|
parse_execution_result_t case_result =
|
2018-01-16 07:15:45 +08:00
|
|
|
this->expand_arguments_from_nodes(arg_nodes, &case_args, failglob);
|
2016-10-31 11:26:10 +08:00
|
|
|
if (case_result == parse_execution_success) {
|
2018-01-14 18:30:18 +08:00
|
|
|
for (const wcstring &arg : case_args) {
|
2016-10-31 11:26:10 +08:00
|
|
|
// Unescape wildcards so they can be expanded again.
|
|
|
|
wcstring unescaped_arg = parse_util_unescape_wildcards(arg);
|
|
|
|
bool match = wildcard_match(switch_value_expanded, unescaped_arg);
|
|
|
|
|
|
|
|
// If this matched, we're done.
|
|
|
|
if (match) {
|
|
|
|
matching_case_item = case_item;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-03-29 07:56:44 +08:00
|
|
|
}
|
2018-01-14 18:30:18 +08:00
|
|
|
if (matching_case_item) break;
|
2016-10-31 11:26:10 +08:00
|
|
|
}
|
2013-12-27 19:58:42 +08:00
|
|
|
|
2018-01-14 18:30:18 +08:00
|
|
|
if (matching_case_item) {
|
2016-10-31 11:26:10 +08:00
|
|
|
// Success, evaluate the job list.
|
2018-01-14 18:30:18 +08:00
|
|
|
assert(result == parse_execution_success && "Expected success");
|
|
|
|
auto job_list = matching_case_item.child<3>();
|
|
|
|
result = this->run_job_list(job_list, sb);
|
2014-03-29 07:56:44 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-10-31 11:26:10 +08:00
|
|
|
parser->pop_block(sb);
|
2014-01-01 06:37:37 +08:00
|
|
|
return result;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_while_statement(
|
2018-01-14 18:41:37 +08:00
|
|
|
tnode_t<grammar::while_header> header, tnode_t<grammar::job_list> contents) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Push a while block.
|
2017-01-22 07:35:35 +08:00
|
|
|
while_block_t *wb = parser->push_block<while_block_t>();
|
2013-12-29 08:18:38 +08:00
|
|
|
wb->node_offset = this->get_offset(header);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t ret = parse_execution_success;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// The conditions of the while loop.
|
2018-01-14 18:41:37 +08:00
|
|
|
tnode_t<g::job> condition_head = header.child<1>();
|
|
|
|
tnode_t<g::andor_job_list> condition_boolean_tail = header.child<3>();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Run while the condition is true.
|
|
|
|
for (;;) {
|
|
|
|
// Check the condition.
|
2015-12-20 06:45:45 +08:00
|
|
|
parse_execution_result_t cond_ret = this->run_1_job(condition_head, wb);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (cond_ret == parse_execution_success) {
|
2015-12-20 06:45:45 +08:00
|
|
|
cond_ret = run_job_list(condition_boolean_tail, wb);
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
|
|
|
|
// We only continue on successful execution and EXIT_SUCCESS.
|
|
|
|
if (cond_ret != parse_execution_success || proc_get_last_status() != EXIT_SUCCESS) {
|
2014-01-01 06:37:37 +08:00
|
|
|
break;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Check cancellation.
|
|
|
|
if (this->should_cancel_execution(wb)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
ret = parse_execution_cancelled;
|
|
|
|
break;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// The block ought to go inside the loop (see issue #1212).
|
2018-01-14 18:41:37 +08:00
|
|
|
this->run_job_list(contents, wb);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (this->cancellation_reason(wb) == execution_cancellation_loop_control) {
|
|
|
|
// Handle break or continue.
|
|
|
|
if (wb->loop_status == LOOP_CONTINUE) {
|
|
|
|
// Reset the loop state.
|
2013-12-30 08:23:26 +08:00
|
|
|
wb->loop_status = LOOP_NORMAL;
|
|
|
|
continue;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (wb->loop_status == LOOP_BREAK) {
|
2013-12-30 08:23:26 +08:00
|
|
|
break;
|
|
|
|
}
|
2013-12-29 14:52:06 +08:00
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
|
|
|
|
// no_exec means that fish was invoked with -n or --no-execute. If set, we allow the loop to
|
|
|
|
// not-execute once so its contents can be checked, and then break.
|
|
|
|
if (no_exec) {
|
2014-07-12 02:28:10 +08:00
|
|
|
break;
|
|
|
|
}
|
2013-12-27 04:24:00 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-01-22 07:35:35 +08:00
|
|
|
// Done
|
2013-12-27 04:24:00 +08:00
|
|
|
parser->pop_block(wb);
|
2014-01-01 06:37:37 +08:00
|
|
|
return ret;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Reports an error. Always returns parse_execution_errored, so you can assign the result to an
|
|
|
|
// 'errored' variable.
|
|
|
|
parse_execution_result_t parse_execution_context_t::report_error(const parse_node_t &node,
|
|
|
|
const wchar_t *fmt, ...) const {
|
|
|
|
// Create an error.
|
2016-02-28 10:37:59 +08:00
|
|
|
parse_error_list_t error_list = parse_error_list_t(1);
|
|
|
|
parse_error_t *error = &error_list.at(0);
|
|
|
|
error->source_start = node.source_start;
|
|
|
|
error->source_length = node.source_length;
|
2016-05-03 03:31:33 +08:00
|
|
|
error->code = parse_error_syntax; // hackish
|
2016-02-28 10:37:59 +08:00
|
|
|
|
|
|
|
va_list va;
|
|
|
|
va_start(va, fmt);
|
|
|
|
error->text = vformat_string(fmt, va);
|
|
|
|
va_end(va);
|
|
|
|
|
|
|
|
this->report_errors(error_list);
|
2014-03-22 08:13:33 +08:00
|
|
|
return parse_execution_errored;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::report_errors(
|
|
|
|
const parse_error_list_t &error_list) const {
|
|
|
|
if (!parser->cancellation_requested) {
|
|
|
|
if (error_list.empty()) {
|
2017-01-03 13:11:53 +08:00
|
|
|
debug(0, "Error reported but no error text found.");
|
2014-03-22 08:13:33 +08:00
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get a backtrace.
|
2014-01-09 10:20:55 +08:00
|
|
|
wcstring backtrace_and_desc;
|
2017-12-23 06:40:15 +08:00
|
|
|
parser->get_backtrace(pstree->src, error_list, backtrace_and_desc);
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Print it.
|
2017-01-03 13:11:53 +08:00
|
|
|
if (!should_suppress_stderr_for_tests()) {
|
|
|
|
fwprintf(stderr, L"%ls", backtrace_and_desc.c_str());
|
|
|
|
}
|
2014-01-09 10:20:55 +08:00
|
|
|
}
|
2014-01-01 06:37:37 +08:00
|
|
|
return parse_execution_errored;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
/// Reports an unmatched wildcard error and returns parse_execution_errored.
|
|
|
|
parse_execution_result_t parse_execution_context_t::report_unmatched_wildcard_error(
|
|
|
|
const parse_node_t &unmatched_wildcard) {
|
2013-12-27 17:38:43 +08:00
|
|
|
proc_set_last_status(STATUS_UNMATCHED_WILDCARD);
|
2016-02-09 02:49:26 +08:00
|
|
|
report_error(unmatched_wildcard, WILDCARD_ERR_MSG, get_source(unmatched_wildcard).c_str());
|
2014-06-01 03:41:27 +08:00
|
|
|
return parse_execution_errored;
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
|
|
|
|
2016-07-06 13:33:32 +08:00
|
|
|
// Given a command string that might contain fish special tokens return a string without those
|
|
|
|
// tokens.
|
2017-03-29 10:15:08 +08:00
|
|
|
//
|
|
|
|
// TODO(krader1961): Figure out what VARIABLE_EXPAND means in this context. After looking at the
|
|
|
|
// code and doing various tests I couldn't figure out why that token would be present when this
|
|
|
|
// code is run. I was therefore unable to determine how to substitute its presence in the error
|
|
|
|
// message.
|
|
|
|
static wcstring reconstruct_orig_str(wcstring tokenized_str) {
|
|
|
|
wcstring orig_str = tokenized_str;
|
|
|
|
|
|
|
|
if (tokenized_str.find(VARIABLE_EXPAND_SINGLE) != std::string::npos) {
|
2016-07-06 13:33:32 +08:00
|
|
|
// Variable was quoted to force expansion of multiple elements into a single element.
|
|
|
|
//
|
|
|
|
// The following isn't entirely correct. For example, $abc"$def" will become "$abc$def".
|
|
|
|
// However, anyone writing the former is asking for trouble so I don't feel bad about not
|
|
|
|
// accurately reconstructing what they typed.
|
2017-03-29 10:15:08 +08:00
|
|
|
wcstring new_str = wcstring(tokenized_str);
|
|
|
|
std::replace(new_str.begin(), new_str.end(), (wchar_t)VARIABLE_EXPAND_SINGLE, L'$');
|
|
|
|
orig_str = L"\"" + new_str + L"\"";
|
2016-07-06 13:33:32 +08:00
|
|
|
}
|
|
|
|
|
2017-03-29 10:15:08 +08:00
|
|
|
return orig_str;
|
2016-07-06 13:33:32 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
/// Handle the case of command not found.
|
|
|
|
parse_execution_result_t parse_execution_context_t::handle_command_not_found(
|
2018-01-16 04:41:54 +08:00
|
|
|
const wcstring &cmd_str, tnode_t<g::plain_statement> statement, int err_code) {
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// We couldn't find the specified command. This is a non-fatal error. We want to set the exit
|
|
|
|
// status to 127, which is the standard number used by other shells like bash and zsh.
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
const wchar_t *const cmd = cmd_str.c_str();
|
|
|
|
const wchar_t *const equals_ptr = wcschr(cmd, L'=');
|
|
|
|
if (equals_ptr != NULL) {
|
|
|
|
// Try to figure out if this is a pure variable assignment (foo=bar), or if this appears to
|
|
|
|
// be running a command (foo=bar ruby...).
|
|
|
|
const wcstring name_str = wcstring(cmd, equals_ptr - cmd); // variable name, up to the =
|
|
|
|
const wcstring val_str = wcstring(equals_ptr + 1); // variable value, past the =
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2018-01-16 04:41:54 +08:00
|
|
|
auto args = statement.descendants<g::argument>(1);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!args.empty()) {
|
2018-01-16 04:41:54 +08:00
|
|
|
const wcstring argument = get_source(args.at(0));
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2013-12-30 08:23:26 +08:00
|
|
|
wcstring ellipsis_str = wcstring(1, ellipsis_char);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (ellipsis_str == L"$") ellipsis_str = L"...";
|
|
|
|
|
|
|
|
// Looks like a command.
|
2018-01-16 04:41:54 +08:00
|
|
|
this->report_error(statement, ERROR_BAD_EQUALS_IN_COMMAND5, argument.c_str(),
|
2016-05-03 03:31:33 +08:00
|
|
|
name_str.c_str(), val_str.c_str(), argument.c_str(),
|
2014-01-01 06:37:37 +08:00
|
|
|
ellipsis_str.c_str());
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
2017-03-29 10:15:08 +08:00
|
|
|
wcstring assigned_val = reconstruct_orig_str(val_str);
|
2018-01-16 04:41:54 +08:00
|
|
|
this->report_error(statement, ERROR_BAD_COMMAND_ASSIGN_ERR_MSG, name_str.c_str(),
|
2017-03-29 10:15:08 +08:00
|
|
|
assigned_val.c_str());
|
2013-12-30 08:23:26 +08:00
|
|
|
}
|
2016-07-06 13:33:32 +08:00
|
|
|
} else if (wcschr(cmd, L'$') || wcschr(cmd, VARIABLE_EXPAND_SINGLE) ||
|
|
|
|
wcschr(cmd, VARIABLE_EXPAND)) {
|
2017-05-02 12:44:30 +08:00
|
|
|
const wchar_t *msg =
|
|
|
|
_(L"Variables may not be used as commands. In fish, "
|
|
|
|
L"please define a function or use 'eval %ls'.");
|
2017-03-29 10:15:08 +08:00
|
|
|
wcstring eval_cmd = reconstruct_orig_str(cmd_str);
|
2018-01-16 04:41:54 +08:00
|
|
|
this->report_error(statement, msg, eval_cmd.c_str());
|
2016-05-03 03:31:33 +08:00
|
|
|
} else if (err_code != ENOENT) {
|
2018-01-16 04:41:54 +08:00
|
|
|
this->report_error(statement, _(L"The file '%ls' is not executable by this user"), cmd);
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
|
|
|
// Handle unrecognized commands with standard command not found handler that can make better
|
|
|
|
// error messages.
|
2013-12-30 08:23:26 +08:00
|
|
|
wcstring_list_t event_args;
|
2015-04-19 03:53:43 +08:00
|
|
|
{
|
2018-01-16 07:15:45 +08:00
|
|
|
auto args = get_argument_nodes(statement.child<1>());
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t arg_result =
|
2018-01-16 07:15:45 +08:00
|
|
|
this->expand_arguments_from_nodes(args, &event_args, failglob);
|
2015-04-19 03:53:43 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (arg_result != parse_execution_success) {
|
2015-04-19 03:53:43 +08:00
|
|
|
return arg_result;
|
|
|
|
}
|
|
|
|
|
|
|
|
event_args.insert(event_args.begin(), cmd_str);
|
|
|
|
}
|
|
|
|
|
2013-12-30 08:23:26 +08:00
|
|
|
event_fire_generic(L"fish_command_not_found", &event_args);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Here we want to report an error (so it shows a backtrace), but with no text.
|
2018-01-16 04:41:54 +08:00
|
|
|
this->report_error(statement, L"");
|
2013-12-30 08:23:26 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Set the last proc status appropriately.
|
2017-05-04 15:18:02 +08:00
|
|
|
proc_set_last_status(err_code == ENOENT ? STATUS_CMD_UNKNOWN : STATUS_NOT_EXECUTABLE);
|
2015-04-19 03:53:43 +08:00
|
|
|
|
|
|
|
return parse_execution_errored;
|
2013-12-30 08:23:26 +08:00
|
|
|
}
|
2013-12-29 08:18:38 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
/// Creates a 'normal' (non-block) process.
|
|
|
|
parse_execution_result_t parse_execution_context_t::populate_plain_process(
|
2018-01-16 04:12:42 +08:00
|
|
|
job_t *job, process_t *proc, tnode_t<grammar::plain_statement> statement) {
|
2014-01-01 06:37:37 +08:00
|
|
|
assert(job != NULL);
|
|
|
|
assert(proc != NULL);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// We may decide that a command should be an implicit cd.
|
2013-12-30 08:23:26 +08:00
|
|
|
bool use_implicit_cd = false;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the command. We expect to always get it here.
|
2018-01-16 04:12:42 +08:00
|
|
|
wcstring cmd = *command_for_plain_statement(statement, pstree->src);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Expand it as a command. Return an error on failure.
|
2014-03-22 08:13:33 +08:00
|
|
|
bool expanded = expand_one(cmd, EXPAND_SKIP_CMDSUBST | EXPAND_SKIP_VARIABLES, NULL);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!expanded) {
|
2014-01-01 16:04:02 +08:00
|
|
|
report_error(statement, ILLEGAL_CMD_ERR_MSG, cmd.c_str());
|
2016-12-04 00:15:29 +08:00
|
|
|
proc_set_last_status(STATUS_ILLEGAL_CMD);
|
2014-01-01 06:37:37 +08:00
|
|
|
return parse_execution_errored;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Determine the process type.
|
2014-01-01 06:37:37 +08:00
|
|
|
enum process_type_t process_type = process_type_for_command(statement, cmd);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Check for stack overflow.
|
|
|
|
if (process_type == INTERNAL_FUNCTION &&
|
|
|
|
parser->forbidden_function.size() > FISH_MAX_STACK_DEPTH) {
|
2014-01-02 07:29:56 +08:00
|
|
|
this->report_error(statement, CALL_STACK_LIMIT_EXCEEDED_ERR_MSG);
|
|
|
|
return parse_execution_errored;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-08 06:57:58 +08:00
|
|
|
wcstring path_to_external_command;
|
2016-05-03 03:31:33 +08:00
|
|
|
if (process_type == EXTERNAL || process_type == INTERNAL_EXEC) {
|
|
|
|
// Determine the actual command. This may be an implicit cd.
|
2014-01-08 06:57:58 +08:00
|
|
|
bool has_command = path_get_path(cmd, &path_to_external_command);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// If there was no command, then we care about the value of errno after checking for it, to
|
|
|
|
// distinguish between e.g. no file vs permissions problem.
|
2013-12-30 08:23:26 +08:00
|
|
|
const int no_cmd_err_code = errno;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// If the specified command does not exist, and is undecorated, try using an implicit cd.
|
2018-01-16 04:12:42 +08:00
|
|
|
if (!has_command && get_decoration(statement) == parse_statement_decoration_none) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Implicit cd requires an empty argument and redirection list.
|
2018-01-16 04:12:42 +08:00
|
|
|
tnode_t<g::arguments_or_redirections_list> args = statement.child<1>();
|
|
|
|
if (!args.try_get_child<g::argument_or_redirection, 0>()) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Ok, no arguments or redirections; check to see if the first argument is a
|
|
|
|
// directory.
|
2013-12-30 08:23:26 +08:00
|
|
|
wcstring implicit_cd_path;
|
|
|
|
use_implicit_cd = path_can_be_implicit_cd(cmd, &implicit_cd_path);
|
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!has_command && !use_implicit_cd) {
|
|
|
|
// No command.
|
2015-04-19 03:53:43 +08:00
|
|
|
return this->handle_command_not_found(cmd, statement, no_cmd_err_code);
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// The argument list and set of IO redirections that we will construct for the process.
|
2013-12-30 08:23:26 +08:00
|
|
|
io_chain_t process_io_chain;
|
2015-04-19 03:53:43 +08:00
|
|
|
wcstring_list_t argument_list;
|
2016-05-03 03:31:33 +08:00
|
|
|
if (use_implicit_cd) {
|
2013-12-30 08:23:26 +08:00
|
|
|
/* Implicit cd is simple */
|
|
|
|
argument_list.push_back(L"cd");
|
|
|
|
argument_list.push_back(cmd);
|
2014-01-08 06:57:58 +08:00
|
|
|
path_to_external_command.clear();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// If we have defined a wrapper around cd, use it, otherwise use the cd builtin.
|
2013-12-30 08:23:26 +08:00
|
|
|
process_type = function_exists(L"cd") ? INTERNAL_FUNCTION : INTERNAL_BUILTIN;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
2017-04-05 12:28:57 +08:00
|
|
|
const globspec_t glob_behavior = (cmd == L"set" || cmd == L"count") ? nullglob : failglob;
|
2017-06-19 13:07:48 +08:00
|
|
|
// Form the list of arguments. The command is the first argument.
|
2018-01-16 07:15:45 +08:00
|
|
|
argument_node_list_t arg_nodes = statement.descendants<g::argument>();
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t arg_result =
|
2018-01-16 07:15:45 +08:00
|
|
|
this->expand_arguments_from_nodes(arg_nodes, &argument_list, glob_behavior);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (arg_result != parse_execution_success) {
|
2014-06-01 03:41:27 +08:00
|
|
|
return arg_result;
|
|
|
|
}
|
2013-12-30 08:23:26 +08:00
|
|
|
argument_list.insert(argument_list.begin(), cmd);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// The set of IO redirections that we construct for the process.
|
2018-01-16 07:37:13 +08:00
|
|
|
if (!this->determine_io_chain(statement.child<1>(), &process_io_chain)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
return parse_execution_errored;
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Determine the process type.
|
2014-01-01 06:37:37 +08:00
|
|
|
process_type = process_type_for_command(statement, cmd);
|
2013-12-30 08:23:26 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Populate the process.
|
2014-01-01 06:37:37 +08:00
|
|
|
proc->type = process_type;
|
|
|
|
proc->set_argv(argument_list);
|
|
|
|
proc->set_io_chain(process_io_chain);
|
2014-01-08 06:57:58 +08:00
|
|
|
proc->actual_cmd = path_to_external_command;
|
2014-01-01 06:37:37 +08:00
|
|
|
return parse_execution_success;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Determine the list of arguments, expanding stuff. Reports any errors caused by expansion. If we
|
|
|
|
// have a wildcard that could not be expanded, report the error and continue.
|
2018-01-16 07:15:45 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::expand_arguments_from_nodes(
|
|
|
|
const argument_node_list_t &argument_nodes, wcstring_list_t *out_arguments,
|
|
|
|
globspec_t glob_behavior) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get all argument nodes underneath the statement. We guess we'll have that many arguments (but
|
|
|
|
// may have more or fewer, if there are wildcards involved).
|
2014-06-01 03:41:27 +08:00
|
|
|
out_arguments->reserve(out_arguments->size() + argument_nodes.size());
|
2016-02-28 08:14:05 +08:00
|
|
|
std::vector<completion_t> arg_expanded;
|
2018-01-16 07:15:45 +08:00
|
|
|
for (const auto arg_node : argument_nodes) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Expect all arguments to have source.
|
2013-12-25 05:17:24 +08:00
|
|
|
assert(arg_node.has_source());
|
2017-12-23 06:40:15 +08:00
|
|
|
const wcstring arg_str = arg_node.get_source(pstree->src);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Expand this string.
|
2014-03-22 08:13:33 +08:00
|
|
|
parse_error_list_t errors;
|
2016-02-28 08:14:05 +08:00
|
|
|
arg_expanded.clear();
|
2015-07-28 09:45:47 +08:00
|
|
|
int expand_ret = expand_string(arg_str, &arg_expanded, EXPAND_NO_DESCRIPTIONS, &errors);
|
2018-01-16 07:15:45 +08:00
|
|
|
parse_error_offset_source_start(&errors, arg_node.source_range()->start);
|
2016-05-03 03:31:33 +08:00
|
|
|
switch (expand_ret) {
|
|
|
|
case EXPAND_ERROR: {
|
2014-03-22 08:13:33 +08:00
|
|
|
this->report_errors(errors);
|
2016-02-09 02:49:26 +08:00
|
|
|
return parse_execution_errored;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
case EXPAND_WILDCARD_NO_MATCH: {
|
|
|
|
if (glob_behavior == failglob) {
|
|
|
|
// Report the unmatched wildcard error and stop processing.
|
2016-02-09 02:49:26 +08:00
|
|
|
report_unmatched_wildcard_error(arg_node);
|
|
|
|
return parse_execution_errored;
|
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case EXPAND_WILDCARD_MATCH:
|
2016-05-03 03:31:33 +08:00
|
|
|
case EXPAND_OK: {
|
2013-12-25 05:17:24 +08:00
|
|
|
break;
|
|
|
|
}
|
2016-10-30 08:25:48 +08:00
|
|
|
default: {
|
|
|
|
DIE("unexpected expand_string() return value");
|
|
|
|
break;
|
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-01-27 08:14:50 +08:00
|
|
|
// Now copy over any expanded arguments. Use std::move() to avoid extra allocations; this
|
2016-05-03 03:31:33 +08:00
|
|
|
// is called very frequently.
|
2017-01-27 08:14:50 +08:00
|
|
|
out_arguments->reserve(out_arguments->size() + arg_expanded.size());
|
|
|
|
for (completion_t &new_arg : arg_expanded) {
|
|
|
|
out_arguments->push_back(std::move(new_arg.completion));
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-02-09 02:49:26 +08:00
|
|
|
return parse_execution_success;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2018-01-16 07:37:13 +08:00
|
|
|
bool parse_execution_context_t::determine_io_chain(tnode_t<g::arguments_or_redirections_list> node,
|
2016-05-03 03:31:33 +08:00
|
|
|
io_chain_t *out_chain) {
|
2013-12-25 05:17:24 +08:00
|
|
|
io_chain_t result;
|
2013-12-27 04:55:10 +08:00
|
|
|
bool errored = false;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get all redirection nodes underneath the statement.
|
2018-01-16 07:37:13 +08:00
|
|
|
auto redirect_nodes = node.descendants<g::redirection>();
|
|
|
|
for (tnode_t<g::redirection> redirect_node : redirect_nodes) {
|
2016-05-03 03:31:33 +08:00
|
|
|
int source_fd = -1; // source fd
|
|
|
|
wcstring target; // file path or target fd
|
|
|
|
enum token_type redirect_type =
|
2018-01-16 07:37:13 +08:00
|
|
|
redirection_type(redirect_node, pstree->src, &source_fd, &target);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// PCA: I can't justify this EXPAND_SKIP_VARIABLES flag. It was like this when I got here.
|
2014-03-22 08:13:33 +08:00
|
|
|
bool target_expanded = expand_one(target, no_exec ? EXPAND_SKIP_VARIABLES : 0, NULL);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!target_expanded || target.empty()) {
|
|
|
|
// TODO: Improve this error message.
|
|
|
|
errored =
|
|
|
|
report_error(redirect_node, _(L"Invalid redirection target: %ls"), target.c_str());
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Generate the actual IO redirection.
|
2013-12-25 05:17:24 +08:00
|
|
|
shared_ptr<io_data_t> new_io;
|
|
|
|
assert(redirect_type != TOK_NONE);
|
2016-05-03 03:31:33 +08:00
|
|
|
switch (redirect_type) {
|
|
|
|
case TOK_REDIRECT_FD: {
|
|
|
|
if (target == L"-") {
|
2013-12-25 05:17:24 +08:00
|
|
|
new_io.reset(new io_close_t(source_fd));
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
2016-11-23 12:24:03 +08:00
|
|
|
int old_fd = fish_wcstoi(target.c_str());
|
|
|
|
if (errno || old_fd < 0) {
|
2017-05-02 12:44:30 +08:00
|
|
|
const wchar_t *fmt =
|
|
|
|
_(L"Requested redirection to '%ls', "
|
|
|
|
L"which is not a valid file descriptor");
|
|
|
|
errored = report_error(redirect_node, fmt, target.c_str());
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
2015-01-09 02:44:05 +08:00
|
|
|
new_io.reset(new io_fd_t(source_fd, old_fd, true));
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case TOK_REDIRECT_OUT:
|
|
|
|
case TOK_REDIRECT_APPEND:
|
|
|
|
case TOK_REDIRECT_IN:
|
2016-05-03 03:31:33 +08:00
|
|
|
case TOK_REDIRECT_NOCLOB: {
|
2013-12-25 05:17:24 +08:00
|
|
|
int oflags = oflags_for_redirection_type(redirect_type);
|
|
|
|
io_file_t *new_io_file = new io_file_t(source_fd, target, oflags);
|
|
|
|
new_io.reset(new_io_file);
|
|
|
|
break;
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
default: {
|
|
|
|
// Should be unreachable.
|
2017-01-03 13:11:53 +08:00
|
|
|
debug(0, "Unexpected redirection type %ld.", (long)redirect_type);
|
2013-12-25 05:17:24 +08:00
|
|
|
PARSER_DIE();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Append the new_io if we got one.
|
|
|
|
if (new_io.get() != NULL) {
|
2013-12-25 05:17:24 +08:00
|
|
|
result.push_back(new_io);
|
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (out_chain && !errored) {
|
2017-01-27 08:14:50 +08:00
|
|
|
*out_chain = std::move(result);
|
2013-12-27 04:55:10 +08:00
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
return !errored;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::populate_boolean_process(
|
2018-01-16 03:45:47 +08:00
|
|
|
job_t *job, process_t *proc, tnode_t<g::boolean_statement> bool_statement) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Handle a boolean statement.
|
2013-12-25 05:17:24 +08:00
|
|
|
bool skip_job = false;
|
2018-01-16 03:45:47 +08:00
|
|
|
switch (bool_statement_type(bool_statement)) {
|
2016-05-03 03:31:33 +08:00
|
|
|
case parse_bool_and: {
|
2013-12-25 05:17:24 +08:00
|
|
|
// AND. Skip if the last job failed.
|
|
|
|
skip_job = (proc_get_last_status() != 0);
|
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
case parse_bool_or: {
|
2013-12-25 05:17:24 +08:00
|
|
|
// OR. Skip if the last job succeeded.
|
|
|
|
skip_job = (proc_get_last_status() == 0);
|
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
case parse_bool_not: {
|
2013-12-25 05:17:24 +08:00
|
|
|
// NOT. Negate it.
|
2017-01-27 07:06:58 +08:00
|
|
|
job->set_flag(JOB_NEGATE, !job->get_flag(JOB_NEGATE));
|
2013-12-25 05:17:24 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (skip_job) {
|
2014-01-01 06:37:37 +08:00
|
|
|
return parse_execution_skipped;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2018-01-16 03:45:47 +08:00
|
|
|
return this->populate_job_process(job, proc,
|
|
|
|
bool_statement.require_get_child<g::statement, 1>());
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2018-01-16 07:37:13 +08:00
|
|
|
template <typename Type>
|
|
|
|
parse_execution_result_t parse_execution_context_t::populate_block_process(job_t *job,
|
|
|
|
process_t *proc,
|
|
|
|
tnode_t<Type> node) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// We handle block statements by creating INTERNAL_BLOCK_NODE, that will bounce back to us when
|
|
|
|
// it's time to execute them.
|
2016-10-10 05:38:26 +08:00
|
|
|
UNUSED(job);
|
2018-01-16 07:37:13 +08:00
|
|
|
static_assert(Type::token == symbol_block_statement || Type::token == symbol_if_statement ||
|
|
|
|
Type::token == symbol_switch_statement,
|
|
|
|
"Invalid block process");
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// The set of IO redirections that we construct for the process.
|
2018-01-16 07:37:13 +08:00
|
|
|
// TODO: fix this ugly find_child.
|
|
|
|
auto arguments = node.template find_child<g::arguments_or_redirections_list>();
|
2013-12-29 08:18:38 +08:00
|
|
|
io_chain_t process_io_chain;
|
2018-01-16 07:37:13 +08:00
|
|
|
bool errored = !this->determine_io_chain(arguments, &process_io_chain);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (errored) return parse_execution_errored;
|
2013-12-29 08:18:38 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
proc->type = INTERNAL_BLOCK_NODE;
|
2018-01-16 07:37:13 +08:00
|
|
|
proc->internal_block_node = this->get_offset(node);
|
2014-01-01 06:37:37 +08:00
|
|
|
proc->set_io_chain(process_io_chain);
|
|
|
|
return parse_execution_success;
|
2013-12-27 04:24:00 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::populate_job_process(
|
2018-01-16 03:45:47 +08:00
|
|
|
job_t *job, process_t *proc, tnode_t<grammar::statement> statement) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the "specific statement" which is boolean / block / if / switch / decorated.
|
2018-01-16 03:45:47 +08:00
|
|
|
const parse_node_t &specific_statement = *get_child(statement, 0);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t result = parse_execution_success;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
switch (specific_statement.type) {
|
|
|
|
case symbol_boolean_statement: {
|
2018-01-16 03:45:47 +08:00
|
|
|
result = this->populate_boolean_process(job, proc, {&tree(), &specific_statement});
|
2013-12-25 05:17:24 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case symbol_block_statement:
|
2018-01-16 07:37:13 +08:00
|
|
|
result = this->populate_block_process(
|
|
|
|
job, proc, tnode_t<g::block_statement>(&tree(), &specific_statement));
|
|
|
|
break;
|
2013-12-27 04:24:00 +08:00
|
|
|
case symbol_if_statement:
|
2018-01-16 07:37:13 +08:00
|
|
|
result = this->populate_block_process(
|
|
|
|
job, proc, tnode_t<g::if_statement>(&tree(), &specific_statement));
|
|
|
|
break;
|
|
|
|
case symbol_switch_statement:
|
|
|
|
result = this->populate_block_process(
|
|
|
|
job, proc, tnode_t<g::switch_statement>(&tree(), &specific_statement));
|
2013-12-25 05:17:24 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
case symbol_decorated_statement: {
|
|
|
|
// Get the plain statement. It will pull out the decoration itself.
|
2018-01-16 04:12:42 +08:00
|
|
|
tnode_t<g::decorated_statement> dec_stat{&tree(), &specific_statement};
|
|
|
|
auto plain_statement = dec_stat.find_child<g::plain_statement>();
|
2014-01-01 06:37:37 +08:00
|
|
|
result = this->populate_plain_process(job, proc, plain_statement);
|
2013-12-25 05:17:24 +08:00
|
|
|
break;
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
default: {
|
2017-01-03 13:11:53 +08:00
|
|
|
debug(0, L"'%ls' not handled by new parser yet.",
|
|
|
|
specific_statement.describe().c_str());
|
2013-12-27 04:24:00 +08:00
|
|
|
PARSER_DIE();
|
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2013-12-25 05:17:24 +08:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::populate_job_from_job_node(
|
2018-01-14 17:17:57 +08:00
|
|
|
job_t *j, tnode_t<grammar::job> job_node, const block_t *associated_block) {
|
2016-10-10 05:38:26 +08:00
|
|
|
UNUSED(associated_block);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Tell the job what its command is.
|
2013-12-25 05:17:24 +08:00
|
|
|
j->set_command(get_source(job_node));
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// We are going to construct process_t structures for every statement in the job. Get the first
|
|
|
|
// statement.
|
2018-01-16 03:45:47 +08:00
|
|
|
tnode_t<g::statement> statement = job_node.child<0>();
|
|
|
|
assert(statement);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t result = parse_execution_success;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Create processes. Each one may fail.
|
2017-01-24 01:28:34 +08:00
|
|
|
process_list_t processes;
|
|
|
|
processes.emplace_back(new process_t());
|
2018-01-16 03:45:47 +08:00
|
|
|
result = this->populate_job_process(j, processes.back().get(), statement);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Construct process_ts for job continuations (pipelines), by walking the list until we hit the
|
|
|
|
// terminal (empty) job continuation.
|
2018-01-14 17:17:57 +08:00
|
|
|
tnode_t<g::job_continuation> job_cont = job_node.child<1>();
|
|
|
|
assert(job_cont);
|
|
|
|
while (auto pipe = job_cont.try_get_child<g::tok_pipe, 0>()) {
|
|
|
|
if (result != parse_execution_success) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
tnode_t<g::statement> statement = job_cont.require_get_child<g::statement, 1>();
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Handle the pipe, whose fd may not be the obvious stdout.
|
2018-01-14 17:17:57 +08:00
|
|
|
int pipe_write_fd = fd_redirected_by_pipe(get_source(pipe));
|
2016-05-03 03:31:33 +08:00
|
|
|
if (pipe_write_fd == -1) {
|
2018-01-14 17:17:57 +08:00
|
|
|
result = report_error(pipe, ILLEGAL_FD_ERR_MSG, get_source(pipe).c_str());
|
2014-01-13 19:57:59 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
processes.back()->pipe_write_fd = pipe_write_fd;
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Store the new process (and maybe with an error).
|
2017-01-24 01:28:34 +08:00
|
|
|
processes.emplace_back(new process_t());
|
2018-01-14 17:17:57 +08:00
|
|
|
result = this->populate_job_process(j, processes.back().get(), statement);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get the next continuation.
|
2018-01-14 17:17:57 +08:00
|
|
|
job_cont = job_cont.require_get_child<g::job_continuation, 2>();
|
|
|
|
assert(job_cont);
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-01-24 01:28:34 +08:00
|
|
|
// Inform our processes of who is first and last
|
|
|
|
processes.front()->is_first_in_job = true;
|
|
|
|
processes.back()->is_last_in_job = true;
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Return what happened.
|
|
|
|
if (result == parse_execution_success) {
|
|
|
|
// Link up the processes.
|
2016-10-24 04:58:12 +08:00
|
|
|
assert(!processes.empty()); //!OCLINT(multiple unary operator)
|
2017-01-24 01:28:34 +08:00
|
|
|
j->processes = std::move(processes);
|
2014-01-01 06:37:37 +08:00
|
|
|
}
|
|
|
|
return result;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_1_job(const parse_node_t &job_node,
|
|
|
|
const block_t *associated_block) {
|
|
|
|
if (should_cancel_execution(associated_block)) {
|
2014-01-01 06:37:37 +08:00
|
|
|
return parse_execution_cancelled;
|
2013-12-29 08:18:38 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Get terminal modes.
|
2013-12-25 05:17:24 +08:00
|
|
|
struct termios tmodes = {};
|
2016-10-23 02:21:13 +08:00
|
|
|
if (shell_is_interactive() && tcgetattr(STDIN_FILENO, &tmodes)) {
|
|
|
|
// Need real error handling here.
|
|
|
|
wperror(L"tcgetattr");
|
|
|
|
return parse_execution_errored;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Increment the eval_level for the duration of this command.
|
2013-12-27 04:24:00 +08:00
|
|
|
scoped_push<int> saved_eval_level(&eval_level, eval_level + 1);
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Save the node index.
|
2014-03-02 08:04:13 +08:00
|
|
|
scoped_push<node_offset_t> saved_node_offset(&executing_node_idx, this->get_offset(job_node));
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Profiling support.
|
2014-02-10 06:04:43 +08:00
|
|
|
long long start_time = 0, parse_time = 0, exec_time = 0;
|
|
|
|
profile_item_t *profile_item = this->parser->create_profile_item();
|
2016-05-03 03:31:33 +08:00
|
|
|
if (profile_item != NULL) {
|
2014-02-10 06:04:43 +08:00
|
|
|
start_time = get_time();
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// When we encounter a block construct (e.g. while loop) in the general case, we create a "block
|
|
|
|
// process" that has a pointer to its source. This allows us to handle block-level redirections.
|
|
|
|
// However, if there are no redirections, then we can just jump into the block directly, which
|
|
|
|
// is significantly faster.
|
|
|
|
if (job_is_simple_block(job_node)) {
|
2015-07-20 17:34:57 +08:00
|
|
|
parse_execution_result_t result = parse_execution_success;
|
2016-05-03 03:31:33 +08:00
|
|
|
|
2014-01-08 02:45:36 +08:00
|
|
|
const parse_node_t &statement = *get_child(job_node, 0, symbol_statement);
|
|
|
|
const parse_node_t &specific_statement = *get_child(statement, 0);
|
|
|
|
assert(specific_statement_type_is_redirectable_block(specific_statement));
|
2016-05-03 03:31:33 +08:00
|
|
|
switch (specific_statement.type) {
|
|
|
|
case symbol_block_statement: {
|
2018-01-14 17:42:58 +08:00
|
|
|
result = this->run_block_statement({&tree(), &specific_statement});
|
2014-02-10 06:04:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
case symbol_if_statement: {
|
2018-01-14 18:02:02 +08:00
|
|
|
result = this->run_if_statement({&tree(), &specific_statement});
|
2014-02-10 06:04:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
case symbol_switch_statement: {
|
2018-01-14 18:30:18 +08:00
|
|
|
result = this->run_switch_statement({&tree(), &specific_statement});
|
2014-02-10 06:04:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
default: {
|
|
|
|
// Other types should be impossible due to the
|
|
|
|
// specific_statement_type_is_redirectable_block check.
|
2014-01-08 02:45:36 +08:00
|
|
|
PARSER_DIE();
|
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
2014-01-08 02:45:36 +08:00
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (profile_item != NULL) {
|
|
|
|
// Block-types profile a little weird. They have no 'parse' time, and their command is
|
|
|
|
// just the block type.
|
2014-02-10 06:04:43 +08:00
|
|
|
exec_time = get_time();
|
2016-05-03 03:31:33 +08:00
|
|
|
profile_item->level = eval_level;
|
2014-02-10 06:04:43 +08:00
|
|
|
profile_item->parse = 0;
|
2016-05-03 03:31:33 +08:00
|
|
|
profile_item->exec = (int)(exec_time - start_time);
|
2017-12-23 06:40:15 +08:00
|
|
|
profile_item->cmd = profiling_cmd_name_for_redirectable_block(
|
|
|
|
specific_statement, this->tree(), this->pstree->src);
|
2015-07-20 17:34:57 +08:00
|
|
|
profile_item->skipped = false;
|
2014-02-10 06:04:43 +08:00
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2014-02-10 06:04:43 +08:00
|
|
|
return result;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-01-27 06:47:32 +08:00
|
|
|
shared_ptr<job_t> job = std::make_shared<job_t>(acquire_job_id(), block_io);
|
|
|
|
job->tmodes = tmodes;
|
2017-01-27 07:06:58 +08:00
|
|
|
job->set_flag(JOB_CONTROL,
|
2017-01-27 12:00:43 +08:00
|
|
|
(job_control_mode == JOB_CONTROL_ALL) ||
|
|
|
|
((job_control_mode == JOB_CONTROL_INTERACTIVE) && shell_is_interactive()));
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-12-23 06:40:15 +08:00
|
|
|
job->set_flag(JOB_FOREGROUND, !tree().job_should_be_backgrounded(job_node));
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-03-29 19:38:53 +08:00
|
|
|
job->set_flag(JOB_TERMINAL, job->get_flag(JOB_CONTROL) && !is_event);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-01-27 12:00:43 +08:00
|
|
|
job->set_flag(JOB_SKIP_NOTIFICATION,
|
|
|
|
is_subshell || is_block || is_event || !shell_is_interactive());
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Tell the current block what its job is. This has to happen before we populate it (#1394).
|
2017-01-27 06:47:32 +08:00
|
|
|
parser->current_block()->job = job;
|
2014-04-02 15:32:08 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Populate the job. This may fail for reasons like command_not_found. If this fails, an error
|
|
|
|
// will have been printed.
|
|
|
|
parse_execution_result_t pop_result =
|
2018-01-14 17:17:57 +08:00
|
|
|
this->populate_job_from_job_node(job.get(), {&tree(), &job_node}, associated_block);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Clean up the job on failure or cancellation.
|
2014-01-01 06:37:37 +08:00
|
|
|
bool populated_job = (pop_result == parse_execution_success);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!populated_job || this->should_cancel_execution(associated_block)) {
|
2017-01-27 06:47:32 +08:00
|
|
|
assert(parser->current_block()->job == job);
|
2014-04-02 15:32:08 +08:00
|
|
|
parser->current_block()->job = NULL;
|
2014-01-03 04:37:50 +08:00
|
|
|
populated_job = false;
|
2013-12-27 05:36:43 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Store time it took to 'parse' the command.
|
|
|
|
if (profile_item != NULL) {
|
2013-12-27 04:24:00 +08:00
|
|
|
parse_time = get_time();
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (populated_job) {
|
|
|
|
// Success. Give the job to the parser - it will clean it up.
|
2017-01-27 06:47:32 +08:00
|
|
|
parser->job_add(job);
|
2013-12-27 17:38:43 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Check to see if this contained any external commands.
|
2013-12-27 04:55:10 +08:00
|
|
|
bool job_contained_external_command = false;
|
2017-01-27 06:47:32 +08:00
|
|
|
for (const auto &proc : job->processes) {
|
2016-05-03 03:31:33 +08:00
|
|
|
if (proc->type == EXTERNAL) {
|
2013-12-27 04:55:10 +08:00
|
|
|
job_contained_external_command = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Actually execute the job.
|
2017-01-27 06:47:32 +08:00
|
|
|
exec_job(*this->parser, job.get());
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Only external commands require a new fishd barrier.
|
|
|
|
if (job_contained_external_command) {
|
2013-12-27 04:55:10 +08:00
|
|
|
set_proc_had_barrier(false);
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (profile_item != NULL) {
|
2013-12-27 04:24:00 +08:00
|
|
|
exec_time = get_time();
|
2016-05-03 03:31:33 +08:00
|
|
|
profile_item->level = eval_level;
|
|
|
|
profile_item->parse = (int)(parse_time - start_time);
|
|
|
|
profile_item->exec = (int)(exec_time - parse_time);
|
2017-01-27 06:47:32 +08:00
|
|
|
profile_item->cmd = job ? job->command() : wcstring();
|
2016-05-03 03:31:33 +08:00
|
|
|
profile_item->skipped = !populated_job;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
job_reap(0); // clean up jobs
|
2015-07-20 17:34:57 +08:00
|
|
|
return parse_execution_success;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::run_job_list(const parse_node_t &job_list_node,
|
|
|
|
const block_t *associated_block) {
|
2015-12-20 06:45:45 +08:00
|
|
|
assert(job_list_node.type == symbol_job_list || job_list_node.type == symbol_andor_job_list);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
parse_execution_result_t result = parse_execution_success;
|
2013-12-27 04:24:00 +08:00
|
|
|
const parse_node_t *job_list = &job_list_node;
|
2016-05-03 03:31:33 +08:00
|
|
|
while (job_list != NULL && !should_cancel_execution(associated_block)) {
|
2015-12-20 06:45:45 +08:00
|
|
|
assert(job_list->type == symbol_job_list || job_list_node.type == symbol_andor_job_list);
|
2014-01-06 07:23:42 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Try pulling out a job.
|
2017-12-23 06:40:15 +08:00
|
|
|
const parse_node_t *job = tree().next_node_in_node_list(*job_list, symbol_job, &job_list);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
if (job != NULL) {
|
2013-12-29 08:18:38 +08:00
|
|
|
result = this->run_1_job(*job, associated_block);
|
2013-12-27 04:24:00 +08:00
|
|
|
}
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Returns the last job executed.
|
2013-12-27 05:24:10 +08:00
|
|
|
return result;
|
2013-12-27 04:24:00 +08:00
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
parse_execution_result_t parse_execution_context_t::eval_node_at_offset(
|
|
|
|
node_offset_t offset, const block_t *associated_block, const io_chain_t &io) {
|
|
|
|
// Don't ever expect to have an empty tree if this is called.
|
2017-12-23 06:40:15 +08:00
|
|
|
assert(!tree().empty()); //!OCLINT(multiple unary operator)
|
|
|
|
assert(offset < tree().size());
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Apply this block IO for the duration of this function.
|
2013-12-29 08:18:38 +08:00
|
|
|
scoped_push<io_chain_t> block_io_push(&block_io, io);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2017-12-23 06:40:15 +08:00
|
|
|
const parse_node_t &node = tree().at(offset);
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Currently, we only expect to execute the top level job list, or a block node. Assert that.
|
2014-01-08 02:45:36 +08:00
|
|
|
assert(node.type == symbol_job_list || specific_statement_type_is_redirectable_block(node));
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
enum parse_execution_result_t status = parse_execution_success;
|
2016-05-03 03:31:33 +08:00
|
|
|
switch (node.type) {
|
|
|
|
case symbol_job_list: {
|
|
|
|
// We should only get a job list if it's the very first node. This is because this is
|
|
|
|
// the entry point for both top-level execution (the first node) and INTERNAL_BLOCK_NODE
|
|
|
|
// execution (which does block statements, but never job lists).
|
2013-12-27 17:38:43 +08:00
|
|
|
assert(offset == 0);
|
2018-01-14 17:26:28 +08:00
|
|
|
tnode_t<g::job_list> job_list{&tree(), &node};
|
2014-01-02 07:29:56 +08:00
|
|
|
wcstring func_name;
|
2018-01-14 07:36:14 +08:00
|
|
|
auto infinite_recursive_node =
|
2018-01-14 17:26:28 +08:00
|
|
|
this->infinite_recursive_statement_in_job_list(job_list, &func_name);
|
2018-01-14 07:36:14 +08:00
|
|
|
if (infinite_recursive_node) {
|
2016-05-03 03:31:33 +08:00
|
|
|
// We have an infinite recursion.
|
2018-01-14 07:36:14 +08:00
|
|
|
this->report_error(infinite_recursive_node, INFINITE_FUNC_RECURSION_ERR_MSG,
|
2016-05-03 03:31:33 +08:00
|
|
|
func_name.c_str());
|
2014-01-02 07:29:56 +08:00
|
|
|
status = parse_execution_errored;
|
2016-05-03 03:31:33 +08:00
|
|
|
} else {
|
|
|
|
// No infinite recursion.
|
2014-01-02 07:29:56 +08:00
|
|
|
status = this->run_job_list(node, associated_block);
|
|
|
|
}
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
2014-01-02 07:29:56 +08:00
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
case symbol_block_statement: {
|
2018-01-14 17:42:58 +08:00
|
|
|
status = this->run_block_statement({&tree(), &node});
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
case symbol_if_statement: {
|
2018-01-14 18:02:02 +08:00
|
|
|
status = this->run_if_statement({&tree(), &node});
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
case symbol_switch_statement: {
|
2018-01-14 18:30:18 +08:00
|
|
|
status = this->run_switch_statement({&tree(), &node});
|
2013-12-27 17:38:43 +08:00
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
|
|
|
default: {
|
|
|
|
// In principle, we could support other node types. However we never expect to be passed
|
|
|
|
// them - see above.
|
2017-01-03 13:11:53 +08:00
|
|
|
debug(0, "Unexpected node %ls found in %s", node.describe().c_str(), __FUNCTION__);
|
2013-12-27 17:38:43 +08:00
|
|
|
PARSER_DIE();
|
|
|
|
break;
|
2016-05-03 03:31:33 +08:00
|
|
|
}
|
2013-12-27 17:38:43 +08:00
|
|
|
}
|
2014-01-15 17:40:40 +08:00
|
|
|
|
2014-01-01 06:37:37 +08:00
|
|
|
return status;
|
2013-12-25 05:17:24 +08:00
|
|
|
}
|
2014-03-02 08:04:13 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
int parse_execution_context_t::line_offset_of_node_at_offset(node_offset_t requested_index) {
|
|
|
|
// If we're not executing anything, return -1.
|
|
|
|
if (requested_index == NODE_OFFSET_INVALID) {
|
2014-03-02 08:04:13 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// If for some reason we're executing a node without source, return -1.
|
2017-12-23 06:40:15 +08:00
|
|
|
const parse_node_t &node = tree().at(requested_index);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (!node.has_source()) {
|
2014-03-02 08:04:13 +08:00
|
|
|
return -1;
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
|
2017-12-23 06:40:15 +08:00
|
|
|
size_t char_offset = tree().at(requested_index).source_start;
|
2014-09-28 08:32:54 +08:00
|
|
|
return this->line_offset_of_character_at_offset(char_offset);
|
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
int parse_execution_context_t::line_offset_of_character_at_offset(size_t offset) {
|
|
|
|
// Count the number of newlines, leveraging our cache.
|
2017-12-23 06:40:15 +08:00
|
|
|
assert(offset <= pstree->src.size());
|
2014-03-02 08:04:13 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// Easy hack to handle 0.
|
|
|
|
if (offset == 0) {
|
2014-03-17 07:45:00 +08:00
|
|
|
return 0;
|
2014-03-02 08:04:13 +08:00
|
|
|
}
|
2014-04-01 01:01:39 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
// We want to return (one plus) the number of newlines at offsets less than the given offset.
|
|
|
|
// cached_lineno_count is the number of newlines at indexes less than cached_lineno_offset.
|
2017-12-23 06:40:15 +08:00
|
|
|
const wchar_t *str = pstree->src.c_str();
|
2016-05-03 03:31:33 +08:00
|
|
|
if (offset > cached_lineno_offset) {
|
2014-03-02 08:04:13 +08:00
|
|
|
size_t i;
|
2016-05-03 03:31:33 +08:00
|
|
|
for (i = cached_lineno_offset; str[i] != L'\0' && i < offset; i++) {
|
|
|
|
// Add one for every newline we find in the range [cached_lineno_offset, offset).
|
|
|
|
if (str[i] == L'\n') {
|
2014-03-02 08:04:13 +08:00
|
|
|
cached_lineno_count++;
|
|
|
|
}
|
|
|
|
}
|
2016-05-03 03:31:33 +08:00
|
|
|
cached_lineno_offset =
|
|
|
|
i; // note: i, not offset, in case offset is beyond the length of the string
|
|
|
|
} else if (offset < cached_lineno_offset) {
|
|
|
|
// Subtract one for every newline we find in the range [offset, cached_lineno_offset).
|
|
|
|
for (size_t i = offset; i < cached_lineno_offset; i++) {
|
|
|
|
if (str[i] == L'\n') {
|
2014-03-02 08:04:13 +08:00
|
|
|
cached_lineno_count--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
cached_lineno_offset = offset;
|
|
|
|
}
|
2014-03-17 07:45:00 +08:00
|
|
|
return cached_lineno_count;
|
|
|
|
}
|
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
int parse_execution_context_t::get_current_line_number() {
|
2014-03-17 07:45:00 +08:00
|
|
|
int line_number = -1;
|
|
|
|
int line_offset = this->line_offset_of_node_at_offset(this->executing_node_idx);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (line_offset >= 0) {
|
|
|
|
// The offset is 0 based; the number is 1 based.
|
2014-03-17 07:45:00 +08:00
|
|
|
line_number = line_offset + 1;
|
|
|
|
}
|
|
|
|
return line_number;
|
2014-03-02 08:04:13 +08:00
|
|
|
}
|
2014-03-17 13:06:32 +08:00
|
|
|
|
2016-05-03 03:31:33 +08:00
|
|
|
int parse_execution_context_t::get_current_source_offset() const {
|
2014-03-17 13:06:32 +08:00
|
|
|
int result = -1;
|
2016-05-03 03:31:33 +08:00
|
|
|
if (executing_node_idx != NODE_OFFSET_INVALID) {
|
2017-12-23 06:40:15 +08:00
|
|
|
const parse_node_t &node = tree().at(executing_node_idx);
|
2016-05-03 03:31:33 +08:00
|
|
|
if (node.has_source()) {
|
2014-03-17 13:06:32 +08:00
|
|
|
result = static_cast<int>(node.source_start);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|