2014-11-15 16:48:57 +02:00
|
|
|
# Initially based on
|
2013-09-08 18:06:26 +03:00
|
|
|
# https://github.com/joshuaclayton/dotfiles/blob/master/zsh_profile.d/autoenv.zsh
|
|
|
|
|
2014-11-15 16:08:52 +02:00
|
|
|
# TODO: move this to DOTENV_*?!
|
2013-09-08 18:06:26 +03:00
|
|
|
export ENV_AUTHORIZATION_FILE=$HOME/.env_auth
|
|
|
|
|
2014-11-15 16:48:57 +02:00
|
|
|
# Name of file to look for when entering directories.
|
2014-11-15 16:08:52 +02:00
|
|
|
: ${DOTENV_FILE_ENTER:=.env}
|
2014-11-15 16:48:57 +02:00
|
|
|
|
|
|
|
# Name of file to look for when leaving directories.
|
|
|
|
# Requires DOTENV_HANDLE_LEAVE=1.
|
2014-11-15 16:08:52 +02:00
|
|
|
: ${DOTENV_FILE_LEAVE:=.env.leave}
|
|
|
|
|
|
|
|
# Look for .env in parent dirs?
|
|
|
|
: ${DOTENV_LOOK_UPWARDS:=0}
|
|
|
|
|
2014-11-15 16:48:57 +02:00
|
|
|
# Handle leave events when changing away from a subtree, where an "enter"
|
|
|
|
# event was handled?
|
2014-11-15 16:08:52 +02:00
|
|
|
: ${DOTENV_HANDLE_LEAVE:=1}
|
|
|
|
|
|
|
|
|
2014-11-15 16:48:57 +02:00
|
|
|
# Internal: stack of entered (and handled) directories.
|
|
|
|
_dotenv_stack_entered=()
|
|
|
|
|
|
|
|
|
2013-09-08 18:06:26 +03:00
|
|
|
_dotenv_hash_pair() {
|
2014-11-15 15:49:48 +02:00
|
|
|
local env_file=$1
|
2013-09-08 18:06:26 +03:00
|
|
|
env_shasum=$(shasum $env_file | cut -d' ' -f1)
|
|
|
|
echo "$env_file:$env_shasum"
|
|
|
|
}
|
|
|
|
|
|
|
|
_dotenv_authorized_env_file() {
|
2014-11-15 15:49:48 +02:00
|
|
|
local env_file=$1
|
|
|
|
local pair=$(_dotenv_hash_pair $env_file)
|
2014-11-15 16:48:57 +02:00
|
|
|
test -f $ENV_AUTHORIZATION_FILE \
|
|
|
|
&& \grep -qF $pair $ENV_AUTHORIZATION_FILE
|
2013-09-08 18:06:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
_dotenv_authorize() {
|
2014-11-15 15:49:48 +02:00
|
|
|
local env_file=$1
|
2013-09-08 18:06:26 +03:00
|
|
|
_dotenv_deauthorize $env_file
|
|
|
|
_dotenv_hash_pair $env_file >> $ENV_AUTHORIZATION_FILE
|
|
|
|
}
|
|
|
|
|
|
|
|
_dotenv_deauthorize() {
|
2014-11-15 15:49:48 +02:00
|
|
|
local env_file=$1
|
2014-11-15 16:48:57 +02:00
|
|
|
if [[ -f $ENV_AUTHORIZATION_FILE ]]; then
|
|
|
|
echo $(\grep -vF $env_file $ENV_AUTHORIZATION_FILE) > $ENV_AUTHORIZATION_FILE
|
|
|
|
fi
|
2013-09-08 18:06:26 +03:00
|
|
|
}
|
|
|
|
|
2013-09-08 19:32:16 +03:00
|
|
|
# This function can be mocked in tests
|
|
|
|
_dotenv_read_answer() {
|
2014-11-15 16:08:52 +02:00
|
|
|
local answer
|
|
|
|
read -q answer
|
|
|
|
echo $answer
|
2013-09-08 19:32:16 +03:00
|
|
|
}
|
|
|
|
|
2014-11-16 12:39:10 +02:00
|
|
|
# Args: 1: absolute path to env file (resolved symlinks).
|
2014-11-15 16:08:52 +02:00
|
|
|
_dotenv_check_authorized_env_file() {
|
2014-11-15 17:09:02 +02:00
|
|
|
if ! [[ -f $1 ]]; then
|
|
|
|
return 1
|
|
|
|
fi
|
2014-11-15 16:08:52 +02:00
|
|
|
if ! _dotenv_authorized_env_file $1; then
|
2014-11-15 16:48:57 +02:00
|
|
|
echo "Attempting to load unauthorized env file: $1"
|
|
|
|
echo ""
|
|
|
|
echo "**********************************************"
|
|
|
|
echo ""
|
|
|
|
cat $1
|
|
|
|
echo ""
|
|
|
|
echo "**********************************************"
|
|
|
|
echo ""
|
|
|
|
echo -n "Would you like to authorize it? [y/N] "
|
2013-09-08 18:06:26 +03:00
|
|
|
|
2014-11-15 16:08:52 +02:00
|
|
|
local answer=$(_dotenv_read_answer)
|
|
|
|
echo
|
|
|
|
if [[ $answer != 'y' ]]; then
|
|
|
|
return 1
|
2013-09-08 18:06:26 +03:00
|
|
|
fi
|
|
|
|
|
2014-11-15 16:08:52 +02:00
|
|
|
_dotenv_authorize $1
|
|
|
|
fi
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2014-11-15 17:09:37 +02:00
|
|
|
_dotenv_source() {
|
|
|
|
local env_file=$1
|
|
|
|
_dotenv_event=$2
|
|
|
|
_dotenv_cwd=$PWD
|
|
|
|
|
2014-11-15 18:04:36 +02:00
|
|
|
builtin cd -q ${env_file:h}
|
2014-11-15 17:09:37 +02:00
|
|
|
source $env_file
|
2014-11-15 18:04:36 +02:00
|
|
|
builtin cd -q $_dotenv_cwd
|
2014-11-15 17:09:37 +02:00
|
|
|
|
|
|
|
unset _dotenv_event _dotenv_cwd
|
|
|
|
}
|
|
|
|
|
2014-11-15 16:08:52 +02:00
|
|
|
_dotenv_chpwd_handler() {
|
|
|
|
local env_file="$PWD/$DOTENV_FILE_ENTER"
|
|
|
|
|
|
|
|
# Handle leave event for previously sourced env files.
|
|
|
|
if [[ $DOTENV_HANDLE_LEAVE == 1 ]] && (( $#_dotenv_stack_entered )); then
|
|
|
|
for prev_dir in ${_dotenv_stack_entered}; do
|
|
|
|
if ! [[ ${PWD}/ == ${prev_dir}/* ]]; then
|
|
|
|
local env_file_leave=$prev_dir/$DOTENV_FILE_LEAVE
|
|
|
|
if _dotenv_check_authorized_env_file $env_file_leave; then
|
2014-11-15 17:09:37 +02:00
|
|
|
_dotenv_source $env_file_leave leave
|
2014-11-15 16:08:52 +02:00
|
|
|
fi
|
|
|
|
# Remove this entry from the stack.
|
|
|
|
_dotenv_stack_entered=(${_dotenv_stack_entered#$prev_dir})
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
2013-09-08 18:06:26 +03:00
|
|
|
|
2014-11-15 16:08:52 +02:00
|
|
|
if ! [[ -f $env_file ]] && [[ $DOTENV_LOOK_UPWARDS == 1 ]]; then
|
2014-11-16 12:39:10 +02:00
|
|
|
# Look for files in parent dirs, using an extended Zsh glob.
|
2014-11-15 16:08:52 +02:00
|
|
|
setopt localoptions extendedglob
|
|
|
|
local m
|
|
|
|
m=((../)#${DOTENV_FILE_ENTER}(N))
|
|
|
|
if (( $#m )); then
|
2014-11-15 16:48:57 +02:00
|
|
|
env_file=${${m[1]}:A}
|
|
|
|
else
|
|
|
|
return
|
2013-09-08 18:06:26 +03:00
|
|
|
fi
|
|
|
|
fi
|
2014-11-15 16:08:52 +02:00
|
|
|
|
2014-11-15 17:09:02 +02:00
|
|
|
if ! _dotenv_check_authorized_env_file $env_file; then
|
2014-11-15 16:08:52 +02:00
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2014-11-16 12:39:10 +02:00
|
|
|
# Load the env file only once: check if $env_file's parent
|
|
|
|
# is in $_dotenv_stack_entered.
|
|
|
|
local env_file_dir=${env_file:A:h}
|
|
|
|
if (( ${+_dotenv_stack_entered[(r)${env_file_dir}]} )); then
|
2014-11-15 16:08:52 +02:00
|
|
|
return
|
|
|
|
fi
|
|
|
|
|
2014-11-16 12:39:10 +02:00
|
|
|
_dotenv_stack_entered+=(${env_file_dir})
|
2014-11-15 16:08:52 +02:00
|
|
|
|
2014-11-15 17:09:37 +02:00
|
|
|
_dotenv_source $env_file enter
|
2013-09-08 18:06:26 +03:00
|
|
|
}
|
|
|
|
|
2014-11-15 16:08:52 +02:00
|
|
|
autoload -U add-zsh-hook
|
|
|
|
add-zsh-hook chpwd _dotenv_chpwd_handler
|
|
|
|
|
|
|
|
# Look in current directory already.
|
|
|
|
_dotenv_chpwd_handler
|