2017-01-21 15:21:05 +03:00
|
|
|
# frozen_string_literal: true
|
1999-08-13 09:45:20 +04:00
|
|
|
#
|
2002-12-19 23:00:19 +03:00
|
|
|
# tempfile - manipulates temporary files
|
1999-08-13 09:45:20 +04:00
|
|
|
#
|
2002-12-19 23:00:19 +03:00
|
|
|
# $Id$
|
2002-11-18 10:26:44 +03:00
|
|
|
#
|
1999-08-13 09:45:20 +04:00
|
|
|
|
|
|
|
require 'delegate'
|
2003-07-21 19:34:18 +04:00
|
|
|
require 'tmpdir'
|
1999-08-13 09:45:20 +04:00
|
|
|
|
2009-08-26 16:50:57 +04:00
|
|
|
# A utility class for managing temporary files. When you create a Tempfile
|
|
|
|
# object, it will create a temporary file with a unique filename. A Tempfile
|
|
|
|
# objects behaves just like a File object, and you can perform all the usual
|
|
|
|
# file operations on it: reading data, writing data, changing its permissions,
|
|
|
|
# etc. So although this class does not explicitly document all instance methods
|
|
|
|
# supported by File, you can in fact call any File instance method on a
|
|
|
|
# Tempfile object.
|
|
|
|
#
|
|
|
|
# == Synopsis
|
|
|
|
#
|
|
|
|
# require 'tempfile'
|
2009-08-26 17:36:28 +04:00
|
|
|
#
|
2009-08-26 16:50:57 +04:00
|
|
|
# file = Tempfile.new('foo')
|
|
|
|
# file.path # => A unique filename in the OS's temp directory,
|
|
|
|
# # e.g.: "/tmp/foo.24722.0"
|
|
|
|
# # This filename contains 'foo' in its basename.
|
|
|
|
# file.write("hello world")
|
|
|
|
# file.rewind
|
|
|
|
# file.read # => "hello world"
|
|
|
|
# file.close
|
|
|
|
# file.unlink # deletes the temp file
|
|
|
|
#
|
|
|
|
# == Good practices
|
|
|
|
#
|
|
|
|
# === Explicit close
|
|
|
|
#
|
|
|
|
# When a Tempfile object is garbage collected, or when the Ruby interpreter
|
|
|
|
# exits, its associated temporary file is automatically deleted. This means
|
2021-08-31 19:58:42 +03:00
|
|
|
# that it's unnecessary to explicitly delete a Tempfile after use, though
|
|
|
|
# it's a good practice to do so: not explicitly deleting unused Tempfiles can
|
|
|
|
# potentially leave behind a large number of temp files on the filesystem
|
2011-08-27 02:22:37 +04:00
|
|
|
# until they're garbage collected. The existence of these temp files can make
|
2009-08-26 16:50:57 +04:00
|
|
|
# it harder to determine a new Tempfile filename.
|
|
|
|
#
|
|
|
|
# Therefore, one should always call #unlink or close in an ensure block, like
|
|
|
|
# this:
|
|
|
|
#
|
2009-08-26 17:36:28 +04:00
|
|
|
# file = Tempfile.new('foo')
|
2009-08-26 16:50:57 +04:00
|
|
|
# begin
|
2018-12-16 15:09:08 +03:00
|
|
|
# # ...do something with file...
|
2009-08-26 16:50:57 +04:00
|
|
|
# ensure
|
|
|
|
# file.close
|
|
|
|
# file.unlink # deletes the temp file
|
|
|
|
# end
|
|
|
|
#
|
2020-09-25 12:40:50 +03:00
|
|
|
# Tempfile.create { ... } exists for this purpose and is more convenient to use.
|
|
|
|
# Note that Tempfile.create returns a File instance instead of a Tempfile, which
|
|
|
|
# also avoids the overhead and complications of delegation.
|
|
|
|
#
|
2023-02-22 13:37:32 +03:00
|
|
|
# Tempfile.create('foo') do |file|
|
2020-09-25 12:40:50 +03:00
|
|
|
# # ...do something with file...
|
|
|
|
# end
|
|
|
|
#
|
2009-08-26 16:50:57 +04:00
|
|
|
# === Unlink after creation
|
|
|
|
#
|
|
|
|
# On POSIX systems, it's possible to unlink a file right after creating it,
|
|
|
|
# and before closing it. This removes the filesystem entry without closing
|
|
|
|
# the file handle, so it ensures that only the processes that already had
|
|
|
|
# the file handle open can access the file's contents. It's strongly
|
|
|
|
# recommended that you do this if you do not want any other processes to
|
|
|
|
# be able to read from or write to the Tempfile, and you do not need to
|
|
|
|
# know the Tempfile's filename either.
|
|
|
|
#
|
|
|
|
# For example, a practical use case for unlink-after-creation would be this:
|
|
|
|
# you need a large byte buffer that's too large to comfortably fit in RAM,
|
|
|
|
# e.g. when you're writing a web server and you want to buffer the client's
|
|
|
|
# file upload data.
|
|
|
|
#
|
|
|
|
# Please refer to #unlink for more information and a code example.
|
|
|
|
#
|
|
|
|
# == Minor notes
|
|
|
|
#
|
|
|
|
# Tempfile's filename picking method is both thread-safe and inter-process-safe:
|
|
|
|
# it guarantees that no other threads or processes will pick the same filename.
|
|
|
|
#
|
|
|
|
# Tempfile itself however may not be entirely thread-safe. If you access the
|
|
|
|
# same Tempfile object from multiple threads then you should protect it with a
|
|
|
|
# mutex.
|
2004-03-29 11:54:38 +04:00
|
|
|
class Tempfile < DelegateClass(File)
|
2022-05-06 21:07:49 +03:00
|
|
|
|
2023-12-18 07:55:15 +03:00
|
|
|
# The version
|
2023-12-05 10:02:01 +03:00
|
|
|
VERSION = "0.2.1"
|
2023-03-30 08:14:15 +03:00
|
|
|
|
2022-05-06 21:07:49 +03:00
|
|
|
# Creates a file in the underlying file system;
|
|
|
|
# returns a new \Tempfile object based on that file.
|
|
|
|
#
|
|
|
|
# If possible, consider instead using Tempfile.create, which:
|
|
|
|
#
|
|
|
|
# - Avoids the performance cost of delegation,
|
|
|
|
# incurred when Tempfile.new calls its superclass <tt>DelegateClass(File)</tt>.
|
|
|
|
# - Does not rely on a finalizer to close and unlink the file,
|
|
|
|
# which can be unreliable.
|
|
|
|
#
|
|
|
|
# Creates and returns file whose:
|
|
|
|
#
|
|
|
|
# - Class is \Tempfile (not \File, as in Tempfile.create).
|
|
|
|
# - Directory is the system temporary directory (system-dependent).
|
|
|
|
# - Generated filename is unique in that directory.
|
|
|
|
# - Permissions are <tt>0600</tt>;
|
2022-10-12 05:54:16 +03:00
|
|
|
# see {File Permissions}[rdoc-ref:File@File+Permissions].
|
2022-05-06 21:07:49 +03:00
|
|
|
# - Mode is <tt>'w+'</tt> (read/write mode, positioned at the end).
|
|
|
|
#
|
|
|
|
# The underlying file is removed when the \Tempfile object dies
|
|
|
|
# and is reclaimed by the garbage collector.
|
2002-12-19 23:00:19 +03:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Example:
|
2020-09-25 12:40:50 +03:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# f = Tempfile.new # => #<Tempfile:/tmp/20220505-17839-1s0kt30>
|
|
|
|
# f.class # => Tempfile
|
|
|
|
# f.path # => "/tmp/20220505-17839-1s0kt30"
|
|
|
|
# f.stat.mode.to_s(8) # => "100600"
|
|
|
|
# File.exist?(f.path) # => true
|
|
|
|
# File.unlink(f.path) #
|
|
|
|
# File.exist?(f.path) # => false
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Argument +basename+, if given, may be one of:
|
2009-08-26 17:36:28 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# - A string: the generated filename begins with +basename+:
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Tempfile.new('foo') # => #<Tempfile:/tmp/foo20220505-17839-1whk2f>
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# - An array of two strings <tt>[prefix, suffix]</tt>:
|
|
|
|
# the generated filename begins with +prefix+ and ends with +suffix+:
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Tempfile.new(%w/foo .jpg/) # => #<Tempfile:/tmp/foo20220505-17839-58xtfi.jpg>
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# With arguments +basename+ and +tmpdir+, the file is created in directory +tmpdir+:
|
2009-08-26 17:36:28 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Tempfile.new('foo', '.') # => #<Tempfile:./foo20220505-17839-xfstr8>
|
2018-12-16 15:09:08 +03:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Keyword arguments +mode+ and +options+ are passed directly to method
|
2022-10-12 05:54:16 +03:00
|
|
|
# {File.open}[rdoc-ref:File.open]:
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# - The value given with +mode+ must be an integer,
|
|
|
|
# and may be expressed as the logical OR of constants defined in
|
2022-10-12 05:54:16 +03:00
|
|
|
# {File::Constants}[rdoc-ref:File::Constants].
|
|
|
|
# - For +options+, see {Open Options}[rdoc-ref:IO@Open+Options].
|
2022-05-06 21:07:49 +03:00
|
|
|
#
|
|
|
|
# Related: Tempfile.create.
|
2009-08-26 17:36:28 +04:00
|
|
|
#
|
2015-01-04 03:18:38 +03:00
|
|
|
def initialize(basename="", tmpdir=nil, mode: 0, **options)
|
2017-12-12 14:56:25 +03:00
|
|
|
warn "Tempfile.new doesn't call the given block.", uplevel: 1 if block_given?
|
2002-11-17 21:01:17 +03:00
|
|
|
|
2015-05-30 10:01:29 +03:00
|
|
|
@unlinked = false
|
2015-05-30 04:29:48 +03:00
|
|
|
@mode = mode|File::RDWR|File::CREAT|File::EXCL
|
2023-11-08 18:19:45 +03:00
|
|
|
@finalizer_obj = Object.new
|
|
|
|
tmpfile = nil
|
2019-04-08 02:44:49 +03:00
|
|
|
::Dir::Tmpname.create(basename, tmpdir, **options) do |tmpname, n, opts|
|
2014-09-20 21:35:06 +04:00
|
|
|
opts[:perm] = 0600
|
2023-11-08 18:19:45 +03:00
|
|
|
tmpfile = File.open(tmpname, @mode, **opts)
|
2015-05-30 04:29:48 +03:00
|
|
|
@opts = opts.freeze
|
2008-10-18 14:32:26 +04:00
|
|
|
end
|
2023-11-08 18:19:45 +03:00
|
|
|
ObjectSpace.define_finalizer(@finalizer_obj, Remover.new(tmpfile.path))
|
|
|
|
ObjectSpace.define_finalizer(self, Closer.new(tmpfile))
|
2002-11-17 21:01:17 +03:00
|
|
|
|
2023-11-08 18:19:45 +03:00
|
|
|
super(tmpfile)
|
|
|
|
end
|
|
|
|
|
2023-12-18 07:55:15 +03:00
|
|
|
def initialize_dup(other) # :nodoc:
|
2023-11-08 18:19:45 +03:00
|
|
|
initialize_copy_iv(other)
|
|
|
|
super(other)
|
|
|
|
ObjectSpace.define_finalizer(self, Closer.new(__getobj__))
|
|
|
|
end
|
|
|
|
|
2023-12-18 07:55:15 +03:00
|
|
|
def initialize_clone(other) # :nodoc:
|
2023-11-08 18:19:45 +03:00
|
|
|
initialize_copy_iv(other)
|
|
|
|
super(other)
|
|
|
|
ObjectSpace.define_finalizer(self, Closer.new(__getobj__))
|
|
|
|
end
|
|
|
|
|
2023-12-18 07:55:15 +03:00
|
|
|
private def initialize_copy_iv(other) # :nodoc:
|
2023-11-08 18:19:45 +03:00
|
|
|
@unlinked = other.unlinked
|
|
|
|
@mode = other.mode
|
|
|
|
@opts = other.opts
|
|
|
|
@finalizer_obj = other.finalizer_obj
|
1999-08-13 09:45:20 +04:00
|
|
|
end
|
|
|
|
|
2002-12-19 23:00:19 +03:00
|
|
|
# Opens or reopens the file with mode "r+".
|
1999-08-13 09:45:20 +04:00
|
|
|
def open
|
2015-05-30 04:29:48 +03:00
|
|
|
_close
|
2023-11-08 18:19:45 +03:00
|
|
|
ObjectSpace.undefine_finalizer(self)
|
2015-05-30 04:29:48 +03:00
|
|
|
mode = @mode & ~(File::CREAT|File::EXCL)
|
2023-11-08 18:19:45 +03:00
|
|
|
__setobj__(File.open(__getobj__.path, mode, **@opts))
|
|
|
|
ObjectSpace.define_finalizer(self, Closer.new(__getobj__))
|
2023-11-08 19:35:16 +03:00
|
|
|
__getobj__
|
1999-08-13 09:45:20 +04:00
|
|
|
end
|
|
|
|
|
2011-05-19 04:07:25 +04:00
|
|
|
def _close # :nodoc:
|
2023-11-08 18:19:45 +03:00
|
|
|
__getobj__.close
|
2004-03-23 22:14:16 +03:00
|
|
|
end
|
2002-12-19 22:01:59 +03:00
|
|
|
protected :_close
|
|
|
|
|
2009-08-26 16:50:57 +04:00
|
|
|
# Closes the file. If +unlink_now+ is true, then the file will be unlinked
|
|
|
|
# (deleted) after closing. Of course, you can choose to later call #unlink
|
|
|
|
# if you do not unlink it now.
|
2002-12-19 23:00:19 +03:00
|
|
|
#
|
|
|
|
# If you don't explicitly unlink the temporary file, the removal
|
|
|
|
# will be delayed until the object is finalized.
|
2002-12-23 17:48:14 +03:00
|
|
|
def close(unlink_now=false)
|
2015-05-30 04:29:48 +03:00
|
|
|
_close
|
|
|
|
unlink if unlink_now
|
1999-08-13 09:45:20 +04:00
|
|
|
end
|
|
|
|
|
2009-08-26 16:50:57 +04:00
|
|
|
# Closes and unlinks (deletes) the file. Has the same effect as called
|
|
|
|
# <tt>close(true)</tt>.
|
2002-12-19 22:01:59 +03:00
|
|
|
def close!
|
2015-05-30 04:29:48 +03:00
|
|
|
close(true)
|
2002-12-19 22:01:59 +03:00
|
|
|
end
|
|
|
|
|
2009-08-26 16:50:57 +04:00
|
|
|
# Unlinks (deletes) the file from the filesystem. One should always unlink
|
|
|
|
# the file after using it, as is explained in the "Explicit close" good
|
|
|
|
# practice section in the Tempfile overview:
|
|
|
|
#
|
2009-08-26 17:36:28 +04:00
|
|
|
# file = Tempfile.new('foo')
|
2009-08-26 16:50:57 +04:00
|
|
|
# begin
|
2018-12-16 15:09:08 +03:00
|
|
|
# # ...do something with file...
|
2009-08-26 16:50:57 +04:00
|
|
|
# ensure
|
|
|
|
# file.close
|
|
|
|
# file.unlink # deletes the temp file
|
|
|
|
# end
|
|
|
|
#
|
|
|
|
# === Unlink-before-close
|
|
|
|
#
|
|
|
|
# On POSIX systems it's possible to unlink a file before closing it. This
|
|
|
|
# practice is explained in detail in the Tempfile overview (section
|
|
|
|
# "Unlink after creation"); please refer there for more information.
|
|
|
|
#
|
|
|
|
# However, unlink-before-close may not be supported on non-POSIX operating
|
|
|
|
# systems. Microsoft Windows is the most notable case: unlinking a non-closed
|
|
|
|
# file will result in an error, which this method will silently ignore. If
|
|
|
|
# you want to practice unlink-before-close whenever possible, then you should
|
|
|
|
# write code like this:
|
|
|
|
#
|
|
|
|
# file = Tempfile.new('foo')
|
|
|
|
# file.unlink # On Windows this silently fails.
|
|
|
|
# begin
|
2018-12-16 15:09:08 +03:00
|
|
|
# # ... do something with file ...
|
2009-08-26 16:50:57 +04:00
|
|
|
# ensure
|
|
|
|
# file.close! # Closes the file handle. If the file wasn't unlinked
|
|
|
|
# # because #unlink failed, then this method will attempt
|
|
|
|
# # to do so again.
|
|
|
|
# end
|
2002-12-19 22:01:59 +03:00
|
|
|
def unlink
|
2015-05-30 04:29:48 +03:00
|
|
|
return if @unlinked
|
2004-05-07 12:44:24 +04:00
|
|
|
begin
|
2023-11-08 18:19:45 +03:00
|
|
|
File.unlink(__getobj__.path)
|
2012-02-01 20:12:44 +04:00
|
|
|
rescue Errno::ENOENT
|
2005-05-11 05:46:31 +04:00
|
|
|
rescue Errno::EACCES
|
2004-05-07 12:44:24 +04:00
|
|
|
# may not be able to unlink on Windows; just ignore
|
2012-02-01 20:12:44 +04:00
|
|
|
return
|
2004-05-07 12:44:24 +04:00
|
|
|
end
|
2023-11-08 18:19:45 +03:00
|
|
|
ObjectSpace.undefine_finalizer(@finalizer_obj)
|
2015-05-30 04:29:48 +03:00
|
|
|
@unlinked = true
|
2002-12-19 22:01:59 +03:00
|
|
|
end
|
|
|
|
alias delete unlink
|
|
|
|
|
2002-12-19 23:00:19 +03:00
|
|
|
# Returns the full path name of the temporary file.
|
2009-08-26 09:34:47 +04:00
|
|
|
# This will be nil if #unlink has been called.
|
1999-08-13 09:45:20 +04:00
|
|
|
def path
|
2023-11-08 18:19:45 +03:00
|
|
|
@unlinked ? nil : __getobj__.path
|
1999-08-13 09:45:20 +04:00
|
|
|
end
|
2002-06-04 11:34:19 +04:00
|
|
|
|
2002-12-19 23:00:19 +03:00
|
|
|
# Returns the size of the temporary file. As a side effect, the IO
|
|
|
|
# buffer is flushed before determining the size.
|
2002-06-04 11:34:19 +04:00
|
|
|
def size
|
2023-11-08 18:19:45 +03:00
|
|
|
if !__getobj__.closed?
|
|
|
|
__getobj__.size # File#size calls rb_io_flush_raw()
|
2002-06-04 11:34:19 +04:00
|
|
|
else
|
2023-11-08 18:19:45 +03:00
|
|
|
File.size(__getobj__.path)
|
2002-06-04 11:34:19 +04:00
|
|
|
end
|
|
|
|
end
|
2002-12-19 23:00:19 +03:00
|
|
|
alias length size
|
|
|
|
|
2013-05-20 03:03:25 +04:00
|
|
|
# :stopdoc:
|
2012-11-06 12:06:21 +04:00
|
|
|
def inspect
|
2023-11-08 18:19:45 +03:00
|
|
|
if __getobj__.closed?
|
2014-05-27 20:03:35 +04:00
|
|
|
"#<#{self.class}:#{path} (closed)>"
|
|
|
|
else
|
|
|
|
"#<#{self.class}:#{path}>"
|
|
|
|
end
|
2012-11-06 12:06:21 +04:00
|
|
|
end
|
2023-05-01 13:32:38 +03:00
|
|
|
alias to_s inspect
|
2012-11-06 12:06:21 +04:00
|
|
|
|
2023-11-08 18:19:45 +03:00
|
|
|
protected
|
|
|
|
|
|
|
|
attr_reader :unlinked, :mode, :opts, :finalizer_obj
|
|
|
|
|
|
|
|
class Closer # :nodoc:
|
2015-05-30 04:29:48 +03:00
|
|
|
def initialize(tmpfile)
|
|
|
|
@tmpfile = tmpfile
|
2010-02-13 06:20:52 +03:00
|
|
|
end
|
|
|
|
|
2023-11-08 18:19:45 +03:00
|
|
|
def call(*args)
|
|
|
|
@tmpfile.close
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
class Remover # :nodoc:
|
|
|
|
def initialize(path)
|
|
|
|
@pid = Process.pid
|
2023-11-08 18:20:01 +03:00
|
|
|
@path = path
|
2023-11-08 18:19:45 +03:00
|
|
|
end
|
|
|
|
|
2010-02-13 06:20:52 +03:00
|
|
|
def call(*args)
|
2015-05-30 04:29:48 +03:00
|
|
|
return if @pid != Process.pid
|
2002-12-19 23:00:19 +03:00
|
|
|
|
2023-11-08 18:19:45 +03:00
|
|
|
$stderr.puts "removing #{@path}..." if $DEBUG
|
2002-12-19 23:00:19 +03:00
|
|
|
|
2015-05-30 04:29:48 +03:00
|
|
|
begin
|
2023-11-08 18:19:45 +03:00
|
|
|
File.unlink(@path)
|
2015-05-30 04:29:48 +03:00
|
|
|
rescue Errno::ENOENT
|
2010-02-13 06:20:52 +03:00
|
|
|
end
|
2012-02-01 20:12:44 +04:00
|
|
|
|
2017-12-12 14:56:25 +03:00
|
|
|
$stderr.puts "done" if $DEBUG
|
2002-12-19 23:00:19 +03:00
|
|
|
end
|
2010-02-13 06:20:52 +03:00
|
|
|
end
|
2002-12-19 23:00:19 +03:00
|
|
|
|
2010-02-13 06:20:52 +03:00
|
|
|
class << self
|
2014-08-11 06:26:36 +04:00
|
|
|
# :startdoc:
|
|
|
|
|
2009-08-26 16:50:57 +04:00
|
|
|
# Creates a new Tempfile.
|
|
|
|
#
|
2020-09-25 12:40:50 +03:00
|
|
|
# This method is not recommended and exists mostly for backward compatibility.
|
|
|
|
# Please use Tempfile.create instead, which avoids the cost of delegation,
|
|
|
|
# does not rely on a finalizer, and also unlinks the file when given a block.
|
|
|
|
#
|
|
|
|
# Tempfile.open is still appropriate if you need the Tempfile to be unlinked
|
|
|
|
# by a finalizer and you cannot explicitly know where in the program the
|
|
|
|
# Tempfile can be unlinked safely.
|
|
|
|
#
|
2009-08-26 16:50:57 +04:00
|
|
|
# If no block is given, this is a synonym for Tempfile.new.
|
|
|
|
#
|
|
|
|
# If a block is given, then a Tempfile object will be constructed,
|
2020-09-25 12:40:50 +03:00
|
|
|
# and the block is run with the Tempfile object as argument. The Tempfile
|
2011-12-04 17:50:58 +04:00
|
|
|
# object will be automatically closed after the block terminates.
|
2020-09-25 12:40:50 +03:00
|
|
|
# However, the file will *not* be unlinked and needs to be manually unlinked
|
|
|
|
# with Tempfile#close! or Tempfile#unlink. The finalizer will try to unlink
|
|
|
|
# but should not be relied upon as it can keep the file on the disk much
|
|
|
|
# longer than intended. For instance, on CRuby, finalizers can be delayed
|
|
|
|
# due to conservative stack scanning and references left in unused memory.
|
2009-08-26 16:50:57 +04:00
|
|
|
#
|
2020-09-25 12:40:50 +03:00
|
|
|
# The call returns the value of the block.
|
2020-09-08 22:02:56 +03:00
|
|
|
#
|
2017-10-17 02:11:40 +03:00
|
|
|
# In any case, all arguments (<code>*args</code>) will be passed to Tempfile.new.
|
2003-01-20 15:27:53 +03:00
|
|
|
#
|
2009-08-26 16:50:57 +04:00
|
|
|
# Tempfile.open('foo', '/home/temp') do |f|
|
2018-12-16 15:09:08 +03:00
|
|
|
# # ... do something with f ...
|
2009-08-26 16:50:57 +04:00
|
|
|
# end
|
2009-08-26 17:36:28 +04:00
|
|
|
#
|
2009-08-26 16:50:57 +04:00
|
|
|
# # Equivalent:
|
|
|
|
# f = Tempfile.open('foo', '/home/temp')
|
|
|
|
# begin
|
2018-12-16 15:09:08 +03:00
|
|
|
# # ... do something with f ...
|
2009-08-26 16:50:57 +04:00
|
|
|
# ensure
|
|
|
|
# f.close
|
|
|
|
# end
|
2019-09-06 23:37:09 +03:00
|
|
|
def open(*args, **kw)
|
|
|
|
tempfile = new(*args, **kw)
|
2003-01-20 15:27:53 +03:00
|
|
|
|
|
|
|
if block_given?
|
2011-05-19 01:19:18 +04:00
|
|
|
begin
|
|
|
|
yield(tempfile)
|
|
|
|
ensure
|
2020-09-08 22:02:56 +03:00
|
|
|
tempfile.close
|
2011-05-19 01:19:18 +04:00
|
|
|
end
|
2003-01-20 15:27:53 +03:00
|
|
|
else
|
2011-05-19 01:19:18 +04:00
|
|
|
tempfile
|
2003-01-20 15:27:53 +03:00
|
|
|
end
|
2002-12-19 23:00:19 +03:00
|
|
|
end
|
|
|
|
end
|
1999-08-13 09:45:20 +04:00
|
|
|
end
|
|
|
|
|
2022-05-06 21:07:49 +03:00
|
|
|
# Creates a file in the underlying file system;
|
|
|
|
# returns a new \File object based on that file.
|
2013-04-20 17:50:47 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# With no block given and no arguments, creates and returns file whose:
|
2013-04-20 17:50:47 +04:00
|
|
|
#
|
2022-10-12 05:54:16 +03:00
|
|
|
# - Class is {File}[rdoc-ref:File] (not \Tempfile).
|
2022-05-06 21:07:49 +03:00
|
|
|
# - Directory is the system temporary directory (system-dependent).
|
|
|
|
# - Generated filename is unique in that directory.
|
|
|
|
# - Permissions are <tt>0600</tt>;
|
2022-10-12 05:54:16 +03:00
|
|
|
# see {File Permissions}[rdoc-ref:File@File+Permissions].
|
2022-05-06 21:07:49 +03:00
|
|
|
# - Mode is <tt>'w+'</tt> (read/write mode, positioned at the end).
|
2013-04-20 17:50:47 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# With no block, the file is not removed automatically,
|
|
|
|
# and so should be explicitly removed.
|
2013-04-20 17:50:47 +04:00
|
|
|
#
|
2022-05-06 21:07:49 +03:00
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# f = Tempfile.create # => #<File:/tmp/20220505-9795-17ky6f6>
|
|
|
|
# f.class # => File
|
|
|
|
# f.path # => "/tmp/20220505-9795-17ky6f6"
|
|
|
|
# f.stat.mode.to_s(8) # => "100600"
|
|
|
|
# File.exist?(f.path) # => true
|
|
|
|
# File.unlink(f.path)
|
|
|
|
# File.exist?(f.path) # => false
|
|
|
|
#
|
|
|
|
# Argument +basename+, if given, may be one of:
|
|
|
|
#
|
|
|
|
# - A string: the generated filename begins with +basename+:
|
|
|
|
#
|
|
|
|
# Tempfile.create('foo') # => #<File:/tmp/foo20220505-9795-1gok8l9>
|
|
|
|
#
|
|
|
|
# - An array of two strings <tt>[prefix, suffix]</tt>:
|
|
|
|
# the generated filename begins with +prefix+ and ends with +suffix+:
|
|
|
|
#
|
|
|
|
# Tempfile.create(%w/foo .jpg/) # => #<File:/tmp/foo20220505-17839-tnjchh.jpg>
|
|
|
|
#
|
|
|
|
# With arguments +basename+ and +tmpdir+, the file is created in directory +tmpdir+:
|
|
|
|
#
|
|
|
|
# Tempfile.create('foo', '.') # => #<File:./foo20220505-9795-1emu6g8>
|
|
|
|
#
|
|
|
|
# Keyword arguments +mode+ and +options+ are passed directly to method
|
2022-10-12 05:54:16 +03:00
|
|
|
# {File.open}[rdoc-ref:File.open]:
|
2022-05-06 21:07:49 +03:00
|
|
|
#
|
|
|
|
# - The value given with +mode+ must be an integer,
|
|
|
|
# and may be expressed as the logical OR of constants defined in
|
2022-10-12 05:54:16 +03:00
|
|
|
# {File::Constants}[rdoc-ref:File::Constants].
|
|
|
|
# - For +options+, see {Open Options}[rdoc-ref:IO@Open+Options].
|
2022-05-06 21:07:49 +03:00
|
|
|
#
|
|
|
|
# With a block given, creates the file as above, passes it to the block,
|
|
|
|
# and returns the block's value;
|
|
|
|
# before the return, the file object is closed and the underlying file is removed:
|
|
|
|
#
|
|
|
|
# Tempfile.create {|file| file.path } # => "/tmp/20220505-9795-rkists"
|
|
|
|
#
|
|
|
|
# Related: Tempfile.new.
|
2013-04-20 17:50:47 +04:00
|
|
|
#
|
2016-09-26 08:45:29 +03:00
|
|
|
def Tempfile.create(basename="", tmpdir=nil, mode: 0, **options)
|
2013-04-20 17:50:47 +04:00
|
|
|
tmpfile = nil
|
2019-04-08 02:44:49 +03:00
|
|
|
Dir::Tmpname.create(basename, tmpdir, **options) do |tmpname, n, opts|
|
2014-09-20 21:35:06 +04:00
|
|
|
mode |= File::RDWR|File::CREAT|File::EXCL
|
|
|
|
opts[:perm] = 0600
|
Make rb_scan_args handle keywords more similar to Ruby methods (#2460)
Cfuncs that use rb_scan_args with the : entry suffer similar keyword
argument separation issues that Ruby methods suffer if the cfuncs
accept optional or variable arguments.
This makes the following changes to : handling.
* Treats as **kw, prompting keyword argument separation warnings
if called with a positional hash.
* Do not look for an option hash if empty keywords are provided.
For backwards compatibility, treat an empty keyword splat as a empty
mandatory positional hash argument, but emit a a warning, as this
behavior will be removed in Ruby 3. The argument number check
needs to be moved lower so it can correctly handle an empty
positional argument being added.
* If the last argument is nil and it is necessary to treat it as an option
hash in order to make sure all arguments are processed, continue to
treat the last argument as the option hash. Emit a warning in this case,
as this behavior will be removed in Ruby 3.
* If splitting the keyword hash into two hashes, issue a warning, as we
will not be splitting hashes in Ruby 3.
* If the keyword argument is required to fill a mandatory positional
argument, continue to do so, but emit a warning as this behavior will
be going away in Ruby 3.
* If keyword arguments are provided and the last argument is not a hash,
that indicates something wrong. This can happen if a cfunc is calling
rb_scan_args multiple times, and providing arguments that were not
passed to it from Ruby. Callers need to switch to the new
rb_scan_args_kw function, which allows passing of whether keywords
were provided.
This commit fixes all warnings caused by the changes above.
It switches some function calls to *_kw versions with appropriate
kw_splat flags. If delegating arguments, RB_PASS_CALLED_KEYWORDS
is used. If creating new arguments, RB_PASS_KEYWORDS is used if
the last argument is a hash to be treated as keywords.
In open_key_args in io.c, use rb_scan_args_kw.
In this case, the arguments provided come from another C
function, not Ruby. The last argument may or may not be a hash,
so we can't set keyword argument mode. However, if it is a
hash, we don't want to warn when treating it as keywords.
In Ruby files, make sure to appropriately use keyword splats
or literal keywords when calling Cfuncs that now issue keyword
argument separation warnings through rb_scan_args. Also, make
sure not to pass nil in place of an option hash.
Work around Kernel#warn warnings due to problems in the Rubygems
override of the method. There is an open pull request to fix
these issues in Rubygems, but part of the Rubygems tests for
their override fail on ruby-head due to rb_scan_args not
recognizing empty keyword splats, which this commit fixes.
Implementation wise, adding rb_scan_args_kw is kind of a pain,
because rb_scan_args takes a variable number of arguments.
In order to not duplicate all the code, the function internals need
to be split into two functions taking a va_list, and to avoid passing
in a ton of arguments, a single struct argument is used to handle
the variables previously local to the function.
2019-09-25 21:18:49 +03:00
|
|
|
tmpfile = File.open(tmpname, mode, **opts)
|
2013-04-20 17:50:47 +04:00
|
|
|
end
|
|
|
|
if block_given?
|
|
|
|
begin
|
|
|
|
yield tmpfile
|
|
|
|
ensure
|
2017-05-19 12:36:34 +03:00
|
|
|
unless tmpfile.closed?
|
|
|
|
if File.identical?(tmpfile, tmpfile.path)
|
|
|
|
unlinked = File.unlink tmpfile.path rescue nil
|
|
|
|
end
|
|
|
|
tmpfile.close
|
2017-05-19 12:20:14 +03:00
|
|
|
end
|
|
|
|
unless unlinked
|
|
|
|
begin
|
|
|
|
File.unlink tmpfile.path
|
|
|
|
rescue Errno::ENOENT
|
|
|
|
end
|
|
|
|
end
|
2013-04-20 17:50:47 +04:00
|
|
|
end
|
|
|
|
else
|
|
|
|
tmpfile
|
|
|
|
end
|
|
|
|
end
|