artichoke_repl_history/
lib.rs

1#![warn(clippy::all, clippy::pedantic, clippy::undocumented_unsafe_blocks)]
2#![allow(
3    clippy::let_underscore_untyped,
4    reason = "https://github.com/rust-lang/rust-clippy/pull/10442#issuecomment-1516570154"
5)]
6#![allow(
7    clippy::question_mark,
8    reason = "https://github.com/rust-lang/rust-clippy/issues/8281"
9)]
10#![allow(clippy::manual_let_else, reason = "manual_let_else was very buggy on release")]
11#![allow(clippy::missing_errors_doc, reason = "A lot of existing code fails this lint")]
12#![allow(
13    clippy::unnecessary_lazy_evaluations,
14    reason = "https://github.com/rust-lang/rust-clippy/issues/8109"
15)]
16#![cfg_attr(
17    test,
18    allow(clippy::non_ascii_literal, reason = "tests sometimes require UTF-8 string content")
19)]
20#![allow(unknown_lints)]
21#![warn(
22    missing_copy_implementations,
23    missing_debug_implementations,
24    missing_docs,
25    rust_2024_compatibility,
26    trivial_casts,
27    trivial_numeric_casts,
28    unused_qualifications,
29    variant_size_differences
30)]
31// Enable feature callouts in generated documentation:
32// https://doc.rust-lang.org/beta/unstable-book/language-features/doc-cfg.html
33//
34// This approach is borrowed from tokio.
35#![cfg_attr(docsrs, feature(doc_cfg))]
36#![cfg_attr(docsrs, feature(doc_alias))]
37
38//! Helpers for persisting Artichoke `airb` REPL history to disk.
39//!
40//! This crate provides platform support for resolving the Artichoke Ruby `airb`
41//! REPL's application data folder and path to a history file within it.
42//!
43//! # Platform Support
44//!
45//! On Apple targets, the history file is located in the current user's
46//! Application Support directory.
47//!
48//! On Windows, the history file is located in the current user's `LocalAppData`
49//! known folder.
50//!
51//! On Linux and other non-Apple Unix targets, the history file is located in
52//! the `XDG_STATE_HOME` according to the [XDG Base Directory Specification],
53//! with the specified fallback if the environment variable is not set.
54//!
55//! # Examples
56//!
57//! ```
58//! use artichoke_repl_history::repl_history_file;
59//!
60//! if let Some(hist_file) = repl_history_file() {
61//!     // load history ...
62//! }
63//! ```
64//!
65//! [XDG Base Directory Specification]: https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
66
67// Ensure code blocks in `README.md` compile
68#[cfg(doctest)]
69#[doc = include_str!("../README.md")]
70mod readme {}
71
72use std::path::PathBuf;
73
74/// Retrieve the path to the REPL history file.
75///
76/// This function will attempt to create all parent directories of the returned
77/// path. If creating parent directories fails, the error is ignored.
78///
79/// Callers should call this function once at start-up and retain the returned
80/// value for later use. Some platforms depend on ambient global state in the
81/// environment, so subsequent calls may return different results.
82///
83/// # Platform Notes
84///
85/// The file is stored in the application data directory for the host operating
86/// system.
87///
88/// On Apple targets, the history file is located at a path like:
89///
90/// ```text
91/// /Users/username/Library/Application Support/org.artichokeruby.airb/history
92/// ```
93///
94/// On Windows, the history file is located at a path like:
95///
96/// ```text
97/// C:\Users\username\AppData\Local\Artichoke Ruby\airb\data\history.txt
98/// ```
99///
100/// On Linux and other Unix platforms excluding Apple targets, the history file
101/// is located in the XDG state home following the [XDG Base Directory
102/// Specification]. By default, the history file is located at:
103///
104/// ```txt
105/// $HOME/.local/state/artichokeruby/airb_history
106/// ```
107///
108/// # Examples
109///
110/// ```
111/// use artichoke_repl_history::repl_history_file;
112///
113/// if let Some(hist_file) = repl_history_file() {
114///     // load history ...
115/// }
116/// ```
117///
118/// [XDG Base Directory Specification]: https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
119#[must_use]
120pub fn repl_history_file() -> Option<PathBuf> {
121    let data_dir = repl_history_dir()?;
122
123    // Ensure the data directory exists but ignore failures (e.g. the dir
124    // already exists) because all operations on the history file are best
125    // effort and non-blocking.
126    //
127    // On Windows, the data dir is a path like:
128    //
129    // ```
130    // C:\Users\username\AppData\Local\Artichoke Ruby\airb\data
131    // ```
132    //
133    // When this path doesn't exist, it contains several directories that
134    // must be created, so we must use `fs::create_dir_all`.
135    #[cfg(not(any(test, doctest, miri)))] // don't create side effects in tests
136    let _ignored = std::fs::create_dir_all(&data_dir);
137
138    Some(data_dir.join(history_file_basename()))
139}
140
141#[must_use]
142#[cfg(target_vendor = "apple")]
143fn repl_history_dir() -> Option<PathBuf> {
144    use std::env;
145    use std::ffi::{CStr, OsString, c_char};
146    use std::os::unix::ffi::OsStringExt;
147
148    use sysdir::{
149        PATH_MAX, SYSDIR_DOMAIN_MASK_USER, sysdir_get_next_search_path_enumeration, sysdir_search_path_directory_t,
150        sysdir_start_search_path_enumeration,
151    };
152
153    // Use the standard system directories as retrieved by `sysdir(3)` APIs:
154    //
155    // https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html#//apple_ref/doc/uid/TP40010672-CH2-SW6
156    //
157    // Per Apple:
158    //
159    // > The Library Directory Stores App-Specific Files.
160    // >
161    // > Application Support: Use this directory to store all app data files
162    // > except those associated with the user's documents. For example, you
163    // > might use this directory to store app-created data files, configuration
164    // > files, templates, or other fixed or modifiable resources that are
165    // > managed by the app.
166
167    let mut path = [0; PATH_MAX as usize];
168
169    let dir = sysdir_search_path_directory_t::SYSDIR_DIRECTORY_APPLICATION_SUPPORT;
170    let domain_mask = SYSDIR_DOMAIN_MASK_USER;
171
172    // SAFETY: this block uses the `sysdir` C API as documented in the man page.
173    // These `extern "C"`` functions are safe to call as long as the caller
174    // ensures that the `path` buffer is large enough to hold the result. They
175    // will always be available on apple targets which have `libSystem`, which
176    // is true for all apple targets Rust supports.
177    let application_support_bytes = unsafe {
178        // We don't need to loop here, just take the first result.
179        let mut state = sysdir_start_search_path_enumeration(dir, domain_mask);
180        let path = path.as_mut_ptr().cast::<c_char>();
181        state = sysdir_get_next_search_path_enumeration(state, path);
182        if state.is_finished() {
183            return None;
184        }
185        let path = CStr::from_ptr(path);
186        path.to_bytes()
187    };
188
189    // `std::env::home_dir` does not have problematic behavior on `unix`
190    // targets, which includes all apple target OSes and Redox. Per the docs:
191    //
192    // > Deprecated since 1.29.0: This function's behavior may be unexpected on
193    // > Windows. Consider using a crate from crates.io instead.
194    // >
195    // > -- https://doc.rust-lang.org/1.69.0/std/env/fn.home_dir.html
196    //
197    // Additionally, the `home` crate on crates.io, which is owned by the
198    // @rust-lang organization and used in Rustup and Cargo, uses `std::env::home_dir`
199    // to implement `home::home_dir` on `unix` and `target_os = "redox"` targets:
200    //
201    // https://docs.rs/home/0.5.5/src/home/lib.rs.html#71-75
202    #[allow(deprecated)]
203    let application_support = match application_support_bytes {
204        [] => return None,
205        [b'~'] => env::home_dir()?,
206        // Per the `sysdir` man page:
207        //
208        // > Directory paths returned in the user domain will contain `~` to
209        // > refer to the user's directory.
210        //
211        // Below we expand `~/` to `$HOME/` using APIs from `std`.
212        [b'~', b'/', tail @ ..] => {
213            let home = env::home_dir()?;
214            let mut home = home.into_os_string().into_vec();
215
216            home.try_reserve_exact(1 + tail.len()).ok()?;
217            home.push(b'/');
218            home.extend_from_slice(tail);
219
220            OsString::from_vec(home).into()
221        }
222        path => {
223            let mut buf = vec![];
224            buf.try_reserve_exact(path.len()).ok()?;
225            buf.extend_from_slice(path);
226            OsString::from_vec(buf).into()
227        }
228    };
229    // Per Apple docs: All content in this directory should be placed in a
230    // custom subdirectory whose name is that of your app's bundle identifier
231    // or your company.
232    Some(application_support.join("org.artichokeruby.airb"))
233}
234
235#[must_use]
236#[cfg(all(unix, not(target_vendor = "apple")))]
237fn repl_history_dir() -> Option<PathBuf> {
238    use std::env;
239
240    // Use state dir from XDG Base Directory Specification/
241    //
242    // https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html
243    //
244    // `$XDG_STATE_HOME` defines the base directory relative to which
245    // user-specific state files should be stored. If `$XDG_STATE_HOME` is
246    // either not set or empty, a default equal to `$HOME/.local/state` should
247    // be used.
248
249    let state_dir = match env::var_os("XDG_STATE_HOME") {
250        // if `XDG_STATE_HOME` is empty, ignore it and use the default.
251        Some(path) if path.is_empty() => None,
252        Some(path) => Some(path),
253        // if `XDG_STATE_HOME` is not set, use the default.
254        None => None,
255    };
256
257    let state_dir = if let Some(state_dir) = state_dir {
258        PathBuf::from(state_dir)
259    } else {
260        // `std::env::home_dir` does not have problematic behavior on `unix`
261        // targets, which includes all apple target OSes and Redox. Per the docs:
262        //
263        // > Deprecated since 1.29.0: This function's behavior may be unexpected on
264        // > Windows. Consider using a crate from crates.io instead.
265        // >
266        // > -- https://doc.rust-lang.org/1.69.0/std/env/fn.home_dir.html
267        //
268        // Additionally, the `home` crate on crates.io, which is owned by the
269        // @rust-lang organization and used in Rustup and Cargo, uses `std::env::home_dir`
270        // to implement `home::home_dir` on `unix` and `target_os = "redox"` targets:
271        //
272        // https://docs.rs/home/0.5.5/src/home/lib.rs.html#71-75
273        #[allow(deprecated)]
274        let mut state_dir = env::home_dir()?;
275        state_dir.extend([".local", "state"]);
276        state_dir
277    };
278
279    Some(state_dir.join("artichokeruby"))
280}
281
282#[must_use]
283#[cfg(windows)]
284fn repl_history_dir() -> Option<PathBuf> {
285    use known_folders::{KnownFolder, get_known_folder_path};
286
287    let local_app_data = get_known_folder_path(KnownFolder::LocalAppData)?;
288    Some(local_app_data.join("Artichoke Ruby").join("airb").join("data"))
289}
290
291/// Basename for history file.
292///
293/// # Platform Notes
294///
295/// - On Windows, this function returns `history.txt`.
296/// - On Apple targets, this function returns `history`.
297/// - On non-Apple Unix targets, this function returns `airb_history`.
298/// - On all other platforms, this function returns `history`.
299#[must_use]
300fn history_file_basename() -> &'static str {
301    if cfg!(windows) {
302        return "history.txt";
303    }
304    if cfg!(target_vendor = "apple") {
305        return "history";
306    }
307    if cfg!(unix) {
308        return "airb_history";
309    }
310    "history"
311}
312
313#[cfg(test)]
314mod tests {
315    use std::ffi::OsStr;
316    use std::path;
317
318    use super::*;
319
320    // Lock for coordinating access to system env for Unix target tests.
321    #[cfg(all(unix, not(target_vendor = "apple")))]
322    static ENV_LOCK: std::sync::Mutex<()> = std::sync::Mutex::new(());
323
324    #[test]
325    fn history_file_basename_is_non_empty() {
326        assert!(!history_file_basename().is_empty());
327    }
328
329    #[test]
330    fn history_file_basename_does_not_contain_path_separators() {
331        let filename = history_file_basename();
332        for c in filename.chars() {
333            assert!(!path::is_separator(c));
334        }
335    }
336
337    #[test]
338    fn history_file_basename_is_all_ascii() {
339        let filename = history_file_basename();
340        assert!(filename.is_ascii());
341    }
342
343    #[test]
344    fn history_file_basename_contains_the_word_history() {
345        let filename = history_file_basename();
346        assert!(filename.contains("history"));
347    }
348
349    #[test]
350    #[cfg(target_vendor = "apple")]
351    fn history_dir_on_apple_targets() {
352        let dir = repl_history_dir().unwrap();
353        let mut components = dir.components();
354
355        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
356        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Users"));
357        let _skip_user_dir = components.next().unwrap();
358        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Library"));
359        assert_eq!(
360            components.next().unwrap().as_os_str(),
361            OsStr::new("Application Support")
362        );
363        assert_eq!(
364            components.next().unwrap().as_os_str(),
365            OsStr::new("org.artichokeruby.airb")
366        );
367        assert!(components.next().is_none());
368    }
369
370    #[test]
371    #[cfg(target_vendor = "apple")]
372    fn history_file_on_apple_targets() {
373        let file = repl_history_file().unwrap();
374        let mut components = file.components();
375
376        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
377        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Users"));
378        let _skip_user_dir = components.next().unwrap();
379        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Library"));
380        assert_eq!(
381            components.next().unwrap().as_os_str(),
382            OsStr::new("Application Support")
383        );
384        assert_eq!(
385            components.next().unwrap().as_os_str(),
386            OsStr::new("org.artichokeruby.airb")
387        );
388        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("history"));
389        assert!(components.next().is_none());
390    }
391
392    #[test]
393    #[cfg(all(unix, not(target_vendor = "apple")))]
394    fn history_dir_on_unix_xdg_unset() {
395        use std::env;
396
397        let _guard = ENV_LOCK.lock();
398
399        // SAFETY: env access is guarded with a lock and no foreign code is run.
400        unsafe {
401            env::remove_var("XDG_STATE_HOME");
402        }
403
404        let dir = repl_history_dir().unwrap();
405        let mut components = dir.components();
406
407        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
408        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("home"));
409        let _skip_user_dir = components.next().unwrap();
410        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new(".local"));
411        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("state"));
412        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichokeruby"));
413        assert!(components.next().is_none());
414    }
415
416    #[test]
417    #[cfg(all(unix, not(target_vendor = "apple")))]
418    fn history_file_on_unix_xdg_unset() {
419        use std::env;
420
421        let _guard = ENV_LOCK.lock();
422
423        // SAFETY: env access is guarded with a lock and no foreign code is run.
424        unsafe {
425            env::remove_var("XDG_STATE_HOME");
426        }
427
428        let file = repl_history_file().unwrap();
429        let mut components = file.components();
430
431        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
432        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("home"));
433        let _skip_user_dir = components.next().unwrap();
434        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new(".local"));
435        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("state"));
436        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichokeruby"));
437        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("airb_history"));
438        assert!(components.next().is_none());
439    }
440
441    #[test]
442    #[cfg(all(unix, not(target_vendor = "apple")))]
443    fn history_dir_on_unix_empty_xdg_state_dir() {
444        use std::env;
445
446        let _guard = ENV_LOCK.lock();
447
448        // SAFETY: env access is guarded with a lock and no foreign code is run.
449        unsafe {
450            env::remove_var("XDG_STATE_HOME");
451            env::set_var("XDG_STATE_HOME", "");
452        }
453
454        let dir = repl_history_dir().unwrap();
455        let mut components = dir.components();
456
457        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
458        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("home"));
459        let _skip_user_dir = components.next().unwrap();
460        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new(".local"));
461        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("state"));
462        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichokeruby"));
463        assert!(components.next().is_none());
464    }
465
466    #[test]
467    #[cfg(all(unix, not(target_vendor = "apple")))]
468    fn history_file_on_unix_empty_xdg_state_dir() {
469        use std::env;
470
471        let _guard = ENV_LOCK.lock();
472
473        // SAFETY: env access is guarded with a lock and no foreign code is run.
474        unsafe {
475            env::remove_var("XDG_STATE_HOME");
476            env::set_var("XDG_STATE_HOME", "");
477        }
478
479        let file = repl_history_file().unwrap();
480        let mut components = file.components();
481
482        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
483        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("home"));
484        let _skip_user_dir = components.next().unwrap();
485        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new(".local"));
486        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("state"));
487        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichokeruby"));
488        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("airb_history"));
489        assert!(components.next().is_none());
490    }
491
492    #[test]
493    #[cfg(all(unix, not(target_vendor = "apple")))]
494    fn history_dir_on_unix_set_xdg_state_dir() {
495        use std::env;
496
497        let _guard = ENV_LOCK.lock();
498
499        // SAFETY: env access is guarded with a lock and no foreign code is run.
500        unsafe {
501            env::remove_var("XDG_STATE_HOME");
502            env::set_var("XDG_STATE_HOME", "/opt/artichoke/state");
503        }
504
505        let dir = repl_history_dir().unwrap();
506        let mut components = dir.components();
507
508        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
509        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("opt"));
510        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichoke"));
511        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("state"));
512        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichokeruby"));
513        assert!(components.next().is_none());
514    }
515
516    #[test]
517    #[cfg(all(unix, not(target_vendor = "apple")))]
518    fn history_file_on_unix_set_xdg_state_dir() {
519        use std::env;
520
521        let _guard = ENV_LOCK.lock();
522
523        // SAFETY: env access is guarded with a lock and no foreign code is run.
524        unsafe {
525            env::remove_var("XDG_STATE_HOME");
526            env::set_var("XDG_STATE_HOME", "/opt/artichoke/state");
527        }
528
529        let file = repl_history_file().unwrap();
530        let mut components = file.components();
531
532        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("/"));
533        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("opt"));
534        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichoke"));
535        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("state"));
536        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("artichokeruby"));
537        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("airb_history"));
538        assert!(components.next().is_none());
539    }
540
541    #[test]
542    #[cfg(windows)]
543    fn history_dir_on_windows() {
544        let dir = repl_history_dir().unwrap();
545        let mut components = dir.components();
546
547        let _skip_prefix = components.next().unwrap();
548        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new(r"\"));
549        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Users"));
550        let _skip_user_dir = components.next().unwrap();
551        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("AppData"));
552        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Local"));
553        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Artichoke Ruby"));
554        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("airb"));
555        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("data"));
556        assert!(components.next().is_none());
557    }
558
559    #[test]
560    #[cfg(windows)]
561    fn history_file_on_windows() {
562        let file = repl_history_file().unwrap();
563        let mut components = file.components();
564
565        let _skip_prefix = components.next().unwrap();
566        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new(r"\"));
567        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Users"));
568        let _skip_user_dir = components.next().unwrap();
569        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("AppData"));
570        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Local"));
571        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("Artichoke Ruby"));
572        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("airb"));
573        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("data"));
574        assert_eq!(components.next().unwrap().as_os_str(), OsStr::new("history.txt"));
575        assert!(components.next().is_none());
576    }
577}