1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
use std::path::Path;
use std::path::PathBuf;
use home::home_dir;
#[cfg(target_os = "macos")]
pub fn config_path(name: &str) -> PathBuf {
let mut home = home_dir().expect("Failed to get home dir");
home.push("Library");
home.push(name);
home
}
#[cfg(windows)]
pub fn config_path(name: &str) -> PathBuf {
let mut home = home_dir().expect("Failed to get home dir");
home.push("AppData");
home.push("Roaming");
home.push(name);
home
}
#[cfg(not(any(target_os = "macos", windows)))]
pub fn config_path(name: &str) -> PathBuf {
let mut home = home_dir().expect("Failed to get home dir");
home.push(format!(".{}", name.to_lowercase()));
home
}
pub fn config_path_with(name: &str, then: &str) -> PathBuf {
let mut path = config_path(name);
path.push(then);
path
}
pub mod ethereum {
use std::path::PathBuf;
pub fn default() -> PathBuf { super::config_path("Ethereum") }
pub fn test() -> PathBuf {
let mut path = default();
path.push("testnet");
path
}
pub fn with_default(s: &str) -> PathBuf {
let mut path = default();
path.push(s);
path
}
pub fn with_testnet(s: &str) -> PathBuf {
let mut path = default();
path.push("testnet");
path.push(s);
path
}
}
#[cfg(unix)]
pub fn restrict_permissions_owner(file_path: &Path, write: bool, executable: bool) -> Result<(), String> {
let perms = ::std::os::unix::fs::PermissionsExt::from_mode(0o400 + write as u32 * 0o200 + executable as u32 * 0o100);
::std::fs::set_permissions(file_path, perms).map_err(|e| format!("{:?}", e))
}
#[cfg(not(unix))]
pub fn restrict_permissions_owner(_file_path: &Path, _write: bool, _executable: bool) -> Result<(), String> {
Ok(())
}