-# Stolen from
+# Initially based on
# https://github.com/joshuaclayton/dotfiles/blob/master/zsh_profile.d/autoenv.zsh
# TODO: move this to DOTENV_*?!
export ENV_AUTHORIZATION_FILE=$HOME/.env_auth
+# Name of file to look for when entering directories.
: ${DOTENV_FILE_ENTER:=.env}
+
+# Name of file to look for when leaving directories.
+# Requires DOTENV_HANDLE_LEAVE=1.
: ${DOTENV_FILE_LEAVE:=.env.leave}
# Look for .env in parent dirs?
-: ${DOTENV_LOOK_UPWARDS:=0}
+: ${DOTENV_LOOK_UPWARDS:=1}
-# Handle leave events, when leaving ?
+# Handle leave events when changing away from a subtree, where an "enter"
+# event was handled?
: ${DOTENV_HANDLE_LEAVE:=1}
+# Internal: stack of entered (and handled) directories.
+_dotenv_stack_entered=()
+
+
_dotenv_hash_pair() {
local env_file=$1
- env_shasum=$(shasum $env_file | cut -d' ' -f1)
- echo "$env_file:$env_shasum"
+ echo "$env_file:$env_shasum:1"
}
_dotenv_authorized_env_file() {
local env_file=$1
local pair=$(_dotenv_hash_pair $env_file)
- touch $ENV_AUTHORIZATION_FILE
- \grep -Gq $pair $ENV_AUTHORIZATION_FILE
+ test -f $ENV_AUTHORIZATION_FILE \
+ && \grep -qF $pair $ENV_AUTHORIZATION_FILE
}
_dotenv_authorize() {
_dotenv_deauthorize() {
local env_file=$1
- echo $(\grep -Gv $env_file $ENV_AUTHORIZATION_FILE) > $ENV_AUTHORIZATION_FILE
-}
-
-_dotenv_print_unauthorized_message() {
- echo "Attempting to load unauthorized env file: $1"
- echo ""
- echo "**********************************************"
- echo ""
- cat $1
- echo ""
- echo "**********************************************"
- echo ""
- echo -n "Would you like to authorize it? [y/N] "
+ if [[ -f $ENV_AUTHORIZATION_FILE ]]; then
+ echo $(\grep -vF $env_file $ENV_AUTHORIZATION_FILE) > $ENV_AUTHORIZATION_FILE
+ fi
}
# This function can be mocked in tests
_dotenv_read_answer() {
local answer
- read -q answer
+ read $=_AUTOENV_TEST_READ_ARGS -q answer
echo $answer
}
+# Args: 1: absolute path to env file (resolved symlinks).
_dotenv_check_authorized_env_file() {
+ if ! [[ -f $1 ]]; then
+ return 1
+ fi
if ! _dotenv_authorized_env_file $1; then
- _dotenv_print_unauthorized_message $1
+ echo "Attempting to load unauthorized env file: $1"
+ echo ""
+ echo "**********************************************"
+ echo ""
+ cat $1
+ echo ""
+ echo "**********************************************"
+ echo ""
+ echo -n "Would you like to authorize it? [y/N] "
local answer=$(_dotenv_read_answer)
echo
return 0
}
-_dotenv_stack_entered=()
+: ${_dotenv_sourced_varstash:=0}
+_dotenv_this_dir=${0:A:h}
+
+_dotenv_source() {
+ local env_file=$1
+ _dotenv_event=$2
+ _dotenv_cwd=$3
+
+ # Source varstash library once.
+ if [[ $_dotenv_sourced_varstash == 0 ]]; then
+ source $_dotenv_this_dir/lib/varstash
+ export _dotenv_sourced_varstash=1
+ fi
+ # varstash_dir=${env_file:h}
+
+ # Change to directory of env file, source it and cd back.
+ local new_dir=$PWD
+ builtin cd -q $_dotenv_cwd
+ source $env_file
+ builtin cd -q $new_dir
+
+ unset _dotenv_event _dotenv_cwd
+}
_dotenv_chpwd_handler() {
local env_file="$PWD/$DOTENV_FILE_ENTER"
if ! [[ ${PWD}/ == ${prev_dir}/* ]]; then
local env_file_leave=$prev_dir/$DOTENV_FILE_LEAVE
if _dotenv_check_authorized_env_file $env_file_leave; then
- _dotenv_event=leave
- source $env_file_leave
- unset _dotenv_event
+ _dotenv_source $env_file_leave leave $prev_dir
fi
# Remove this entry from the stack.
_dotenv_stack_entered=(${_dotenv_stack_entered#$prev_dir})
fi
if ! [[ -f $env_file ]] && [[ $DOTENV_LOOK_UPWARDS == 1 ]]; then
+ # Look for files in parent dirs, using an extended Zsh glob.
setopt localoptions extendedglob
local m
m=((../)#${DOTENV_FILE_ENTER}(N))
if (( $#m )); then
- env_file=$m[1]
+ env_file=${${m[1]}:A}
+ else
+ return
fi
fi
- if ! [[ -f $env_file ]]; then
- return
- fi
-
if ! _dotenv_check_authorized_env_file $env_file; then
return
fi
- # Load the env file only once.
- if (( ${+_dotenv_stack_entered[(r)${env_file:A:h}]} )); then
+ # Load the env file only once: check if $env_file's parent
+ # is in $_dotenv_stack_entered.
+ local env_file_dir=${env_file:A:h}
+ if (( ${+_dotenv_stack_entered[(r)${env_file_dir}]} )); then
return
fi
- _dotenv_stack_entered+=(${env_file:A:h})
+ _dotenv_stack_entered+=(${env_file_dir})
- _dotenv_event=enter
- source $env_file
- unset _dotenv_event
+ _dotenv_source $env_file enter $PWD
}
autoload -U add-zsh-hook