dodot-lib 4.1.1

Core library for dodot dotfiles manager
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
//! Test infrastructure for dodot.
//!
//! Provides [`TempEnvironment`] — an isolated, real-filesystem test
//! environment with builder-pattern setup and rich assertion helpers.
//!
//! # Example
//!
//! ```rust,ignore
//! let env = TempEnvironment::builder()
//!     .pack("vim")
//!         .file("vimrc", "set nocompatible")
//!         .file("aliases.sh", "alias vi=vim")
//!         .done()
//!     .pack("git")
//!         .file("gitconfig", "[user]\n  name = test")
//!         .done()
//!     .build();
//!
//! assert!(env.fs.exists(&env.dotfiles_root.join("vim/vimrc")));
//! ```

use std::path::{Path, PathBuf};
use std::sync::{Arc, Mutex, MutexGuard};

use tempfile::TempDir;

use crate::fs::{Fs, OsFs};
use crate::paths::{Pather, XdgPather};

/// Shared lock for tests that mutate `$SHELL`. `std::env::set_var` /
/// `remove_var` are process-global, and cargo runs tests in
/// parallel — without this lock, two tests touching `$SHELL` can
/// interleave and observe each other's writes. Held by
/// [`ShellEnvGuard`] for the duration of the guard's lifetime.
static SHELL_ENV_LOCK: Mutex<()> = Mutex::new(());

/// RAII guard that takes the shared `$SHELL` lock, sets `$SHELL` to
/// the requested value (or unsets it for `None`), and restores the
/// previous value when dropped — including on panic, since `Drop`
/// runs during unwind.
///
/// Use this in any test that needs to read `Shell::detect()` /
/// `resolve_shell()` / anything else reading `$SHELL`. The guard's
/// `drop` order matters: it restores `$SHELL` *before* releasing
/// the mutex, so a subsequent guard taken on another thread always
/// sees a clean baseline.
///
/// ```rust,ignore
/// use dodot_lib::testing::ShellEnvGuard;
///
/// #[test]
/// fn my_test() {
///     let _g = ShellEnvGuard::set("/bin/zsh");
///     // assertions that read $SHELL go here; even a panic here
///     // restores the previous $SHELL when _g drops.
/// }
/// ```
pub struct ShellEnvGuard {
    // The mutex guard is `'static` because the underlying mutex is
    // a `static`. Holding it for the lifetime of `Self` keeps the
    // lock until `drop` runs.
    _lock: MutexGuard<'static, ()>,
    prev: Option<String>,
}

impl ShellEnvGuard {
    /// Take the lock, set `$SHELL` to `value`. Restores the
    /// previous value on drop.
    pub fn set(value: &str) -> Self {
        let lock = SHELL_ENV_LOCK
            .lock()
            .unwrap_or_else(|poisoned| poisoned.into_inner());
        let prev = std::env::var("SHELL").ok();
        std::env::set_var("SHELL", value);
        Self { _lock: lock, prev }
    }

    /// Take the lock, unset `$SHELL`. Restores the previous value
    /// on drop.
    pub fn unset() -> Self {
        let lock = SHELL_ENV_LOCK
            .lock()
            .unwrap_or_else(|poisoned| poisoned.into_inner());
        let prev = std::env::var("SHELL").ok();
        std::env::remove_var("SHELL");
        Self { _lock: lock, prev }
    }
}

impl Drop for ShellEnvGuard {
    fn drop(&mut self) {
        // Restore BEFORE the mutex guard's own `drop` releases the
        // lock — Rust drops fields in declaration order, so the
        // restore here happens first, then `_lock` releases.
        match self.prev.take() {
            Some(p) => std::env::set_var("SHELL", p),
            None => std::env::remove_var("SHELL"),
        }
    }
}

/// An isolated test environment backed by real filesystem operations
/// inside a temporary directory.
///
/// All XDG paths, HOME, and DOTFILES_ROOT point inside the temp dir.
/// The directory is cleaned up when this struct is dropped.
pub struct TempEnvironment {
    /// Held to keep the temp directory alive for the lifetime of the env.
    _temp_dir: TempDir,

    /// Simulated HOME directory.
    pub home: PathBuf,

    /// Simulated dotfiles root (DOTFILES_ROOT).
    pub dotfiles_root: PathBuf,

    /// Simulated XDG data dir for dodot.
    pub data_dir: PathBuf,

    /// Simulated XDG config home (e.g. for symlink target mapping).
    pub config_home: PathBuf,

    /// Simulated `~/Library/Application Support` root. Pinned to a
    /// directory under the temp dir on every platform so `_app/` and
    /// `app_aliases` tests behave identically on Linux and macOS.
    pub app_support: PathBuf,

    /// Real filesystem handle.
    pub fs: Arc<OsFs>,

    /// Path resolver with all paths pointing at the temp directory.
    pub paths: Arc<XdgPather>,
}

impl TempEnvironment {
    /// Start building a new test environment.
    pub fn builder() -> TempEnvironmentBuilder {
        TempEnvironmentBuilder {
            packs: Vec::new(),
            extra_home_files: Vec::new(),
        }
    }

    // ── Assertion helpers ───────────────────────────────────────────

    /// Assert that a symlink exists at `link` and points to `target`.
    pub fn assert_symlink(&self, link: &Path, target: &Path) {
        assert!(
            self.fs.is_symlink(link),
            "expected symlink at {}, but it is not a symlink",
            link.display()
        );
        let actual_target = self
            .fs
            .readlink(link)
            .unwrap_or_else(|e| panic!("failed to readlink {}: {e}", link.display()));
        assert_eq!(
            actual_target,
            target,
            "symlink {} points to {}, expected {}",
            link.display(),
            actual_target.display(),
            target.display()
        );
    }

    /// Assert that a file exists at `path` with exactly `expected` contents.
    pub fn assert_file_contents(&self, path: &Path, expected: &str) {
        let actual = self
            .fs
            .read_to_string(path)
            .unwrap_or_else(|e| panic!("failed to read {}: {e}", path.display()));
        assert_eq!(
            actual,
            expected,
            "file {} has unexpected contents",
            path.display()
        );
    }

    /// Assert that a file or directory exists at `path`.
    pub fn assert_exists(&self, path: &Path) {
        assert!(
            self.fs.exists(path),
            "expected {} to exist, but it does not",
            path.display()
        );
    }

    /// Assert that nothing exists at `path`.
    pub fn assert_not_exists(&self, path: &Path) {
        assert!(
            !self.fs.exists(path),
            "expected {} to not exist, but it does",
            path.display()
        );
    }

    /// Assert that `path` is a directory.
    pub fn assert_dir_exists(&self, path: &Path) {
        assert!(
            self.fs.is_dir(path),
            "expected {} to be a directory",
            path.display()
        );
    }

    /// Assert the full double-link chain used by dodot:
    /// `source -> datastore_link -> user_link`.
    ///
    /// - `source`: the original file inside the pack
    /// - The datastore link at `handler_data_dir(pack, handler) / filename`
    ///   must point to `source`
    /// - `user_path` must be a symlink pointing to the datastore link
    pub fn assert_double_link(
        &self,
        pack: &str,
        handler: &str,
        filename: &str,
        source: &Path,
        user_path: &Path,
    ) {
        let datastore_link = self.paths.handler_data_dir(pack, handler).join(filename);

        // Datastore link -> source
        self.assert_symlink(&datastore_link, source);

        // User link -> datastore link
        self.assert_symlink(user_path, &datastore_link);
    }

    /// Assert that no state exists for a pack/handler pair
    /// (i.e. the handler data directory does not exist or is empty).
    pub fn assert_no_handler_state(&self, pack: &str, handler: &str) {
        let dir = self.paths.handler_data_dir(pack, handler);
        if self.fs.exists(&dir) {
            let entries = self.fs.read_dir(&dir).unwrap_or_default();
            assert!(
                entries.is_empty(),
                "expected no state for {pack}/{handler}, but found {} entries in {}",
                entries.len(),
                dir.display()
            );
        }
    }

    /// Assert that a sentinel file exists for a pack/handler.
    pub fn assert_sentinel(&self, pack: &str, handler: &str, sentinel: &str) {
        let sentinel_path = self.paths.handler_data_dir(pack, handler).join(sentinel);
        assert!(
            self.fs.exists(&sentinel_path),
            "expected sentinel {} at {}",
            sentinel,
            sentinel_path.display()
        );
    }

    /// Assert a rendered (non-symlink) file exists in the datastore
    /// with the expected content.
    pub fn assert_rendered_file(&self, pack: &str, handler: &str, filename: &str, expected: &str) {
        let path = self.paths.handler_data_dir(pack, handler).join(filename);
        assert!(
            self.fs.exists(&path),
            "expected rendered file at {}, but it does not exist",
            path.display()
        );
        assert!(
            !self.fs.is_symlink(&path),
            "expected {} to be a regular file, but it is a symlink",
            path.display()
        );
        let actual = self
            .fs
            .read_to_string(&path)
            .unwrap_or_else(|e| panic!("failed to read {}: {e}", path.display()));
        assert_eq!(
            actual,
            expected,
            "rendered file {} has unexpected contents",
            path.display()
        );
    }

    /// Assert that a path is a regular file (not a symlink) with expected content.
    pub fn assert_regular_file(&self, path: &Path, expected: &str) {
        assert!(self.fs.exists(path), "expected {} to exist", path.display());
        assert!(
            !self.fs.is_symlink(path),
            "expected {} to be a regular file, not a symlink",
            path.display()
        );
        let actual = self
            .fs
            .read_to_string(path)
            .unwrap_or_else(|e| panic!("failed to read {}: {e}", path.display()));
        assert_eq!(
            actual,
            expected,
            "file {} has unexpected contents",
            path.display()
        );
    }

    /// Returns the list of file names in a directory.
    pub fn list_dir_names(&self, path: &Path) -> Vec<String> {
        self.fs
            .read_dir(path)
            .unwrap_or_default()
            .into_iter()
            .map(|e| e.name)
            .collect()
    }
}

// ── Builder ─────────────────────────────────────────────────────────

/// Builder for [`TempEnvironment`].
pub struct TempEnvironmentBuilder {
    packs: Vec<PackSpec>,
    extra_home_files: Vec<(String, String)>,
}

struct PackSpec {
    name: String,
    files: Vec<(String, String)>,
    config: Option<String>,
    dodotignore: bool,
}

impl TempEnvironmentBuilder {
    /// Start defining a pack. Returns a [`PackSpecBuilder`] that must
    /// be finished with [`.done()`](PackSpecBuilder::done).
    pub fn pack(self, name: &str) -> PackSpecBuilder {
        PackSpecBuilder {
            parent: self,
            name: name.to_string(),
            files: Vec::new(),
            config: None,
            dodotignore: false,
        }
    }

    /// Add a file under the simulated HOME directory.
    /// Useful for testing adopt (moving existing files into packs).
    pub fn home_file(mut self, relative_path: &str, contents: &str) -> Self {
        self.extra_home_files
            .push((relative_path.to_string(), contents.to_string()));
        self
    }

    /// Build the environment, creating all directories and files.
    pub fn build(self) -> TempEnvironment {
        let temp_dir = TempDir::new().expect("failed to create temp directory");
        let fs = Arc::new(OsFs::new());

        // Set up directory hierarchy
        let home = temp_dir.path().join("home");
        let dotfiles_root = home.join("dotfiles");
        let data_dir = home.join(".local").join("share").join("dodot");
        let config_home = home.join(".config");
        let cache_dir = home.join(".cache").join("dodot");
        let shell_dir = data_dir.join("shell");
        let packs_data_dir = data_dir.join("packs");
        // App-support root pinned under the temp dir on every platform.
        // Real macOS uses `~/Library/Application Support`; tests pin it
        // here so the `_app/` resolver branch routes somewhere we can
        // make assertions about regardless of host OS.
        let app_support = home.join("Library").join("Application Support");

        // Create base directories
        for dir in [
            &home,
            &dotfiles_root,
            &data_dir,
            &config_home,
            &cache_dir,
            &shell_dir,
            &packs_data_dir,
            &app_support,
        ] {
            fs.mkdir_all(dir)
                .unwrap_or_else(|e| panic!("failed to create {}: {e}", dir.display()));
        }

        // Create packs
        for pack in &self.packs {
            let pack_dir = dotfiles_root.join(&pack.name);
            fs.mkdir_all(&pack_dir).unwrap();

            for (rel_path, contents) in &pack.files {
                let file_path = pack_dir.join(rel_path);
                if let Some(parent) = file_path.parent() {
                    fs.mkdir_all(parent).unwrap();
                }
                fs.write_file(&file_path, contents.as_bytes()).unwrap();
            }

            if let Some(config_toml) = &pack.config {
                let config_path = pack_dir.join(".dodot.toml");
                fs.write_file(&config_path, config_toml.as_bytes()).unwrap();
            }

            if pack.dodotignore {
                let ignore_path = pack_dir.join(".dodotignore");
                fs.write_file(&ignore_path, b"").unwrap();
            }
        }

        // Create extra home files
        for (rel_path, contents) in &self.extra_home_files {
            let file_path = home.join(rel_path);
            if let Some(parent) = file_path.parent() {
                fs.mkdir_all(parent).unwrap();
            }
            fs.write_file(&file_path, contents.as_bytes()).unwrap();
        }

        // Build the pather with all paths pointing inside temp dir
        let paths = Arc::new(
            XdgPather::builder()
                .home(&home)
                .dotfiles_root(&dotfiles_root)
                .data_dir(&data_dir)
                .config_dir(config_home.join("dodot"))
                .cache_dir(&cache_dir)
                .xdg_config_home(&config_home)
                .app_support_dir(&app_support)
                .build()
                .expect("failed to build XdgPather for test environment"),
        );

        TempEnvironment {
            _temp_dir: temp_dir,
            home,
            dotfiles_root,
            data_dir,
            config_home,
            app_support,
            fs,
            paths,
        }
    }
}

/// Builder for a single pack within a [`TempEnvironmentBuilder`].
pub struct PackSpecBuilder {
    parent: TempEnvironmentBuilder,
    name: String,
    files: Vec<(String, String)>,
    config: Option<String>,
    dodotignore: bool,
}

impl PackSpecBuilder {
    /// Add a file to this pack.
    pub fn file(mut self, relative_path: &str, contents: &str) -> Self {
        self.files
            .push((relative_path.to_string(), contents.to_string()));
        self
    }

    /// Set the `.dodot.toml` config for this pack.
    pub fn config(mut self, toml_contents: &str) -> Self {
        self.config = Some(toml_contents.to_string());
        self
    }

    /// Mark this pack as ignored (creates `.dodotignore`).
    pub fn ignored(mut self) -> Self {
        self.dodotignore = true;
        self
    }

    /// Finish this pack and return to the parent builder.
    pub fn done(mut self) -> TempEnvironmentBuilder {
        self.parent.packs.push(PackSpec {
            name: self.name,
            files: self.files,
            config: self.config,
            dodotignore: self.dodotignore,
        });
        self.parent
    }
}

#[cfg(test)]
mod tests {
    use super::*;

    #[test]
    fn builder_creates_directory_structure() {
        let env = TempEnvironment::builder()
            .pack("vim")
            .file("vimrc", "set nocompatible")
            .file("gvimrc", "set guifont=Mono")
            .done()
            .pack("git")
            .file("gitconfig", "[user]\n  name = test")
            .done()
            .build();

        // Home and dotfiles root exist
        env.assert_dir_exists(&env.home);
        env.assert_dir_exists(&env.dotfiles_root);

        // Pack directories exist
        env.assert_dir_exists(&env.dotfiles_root.join("vim"));
        env.assert_dir_exists(&env.dotfiles_root.join("git"));

        // Files have correct contents
        env.assert_file_contents(&env.dotfiles_root.join("vim/vimrc"), "set nocompatible");
        env.assert_file_contents(&env.dotfiles_root.join("vim/gvimrc"), "set guifont=Mono");
        env.assert_file_contents(
            &env.dotfiles_root.join("git/gitconfig"),
            "[user]\n  name = test",
        );

        // XDG directories exist
        env.assert_dir_exists(&env.data_dir);
        env.assert_dir_exists(&env.config_home);
    }

    #[test]
    fn builder_creates_nested_files() {
        let env = TempEnvironment::builder()
            .pack("nvim")
            .file("nvim/init.lua", "require('config')")
            .file("nvim/lua/config.lua", "return {}")
            .done()
            .build();

        env.assert_file_contents(
            &env.dotfiles_root.join("nvim/nvim/init.lua"),
            "require('config')",
        );
        env.assert_file_contents(
            &env.dotfiles_root.join("nvim/nvim/lua/config.lua"),
            "return {}",
        );
    }

    #[test]
    fn builder_creates_pack_config() {
        let env = TempEnvironment::builder()
            .pack("shell")
            .file("aliases.sh", "alias ll='ls -la'")
            .config("[pack]\nignore = [\"*.bak\"]")
            .done()
            .build();

        env.assert_file_contents(
            &env.dotfiles_root.join("shell/.dodot.toml"),
            "[pack]\nignore = [\"*.bak\"]",
        );
    }

    #[test]
    fn builder_creates_dodotignore() {
        let env = TempEnvironment::builder()
            .pack("disabled")
            .file("something", "x")
            .ignored()
            .done()
            .build();

        env.assert_exists(&env.dotfiles_root.join("disabled/.dodotignore"));
    }

    #[test]
    fn builder_creates_home_files() {
        let env = TempEnvironment::builder()
            .home_file(".bashrc", "# my bashrc")
            .home_file(".config/nvim/init.lua", "-- nvim config")
            .build();

        env.assert_file_contents(&env.home.join(".bashrc"), "# my bashrc");
        env.assert_file_contents(&env.home.join(".config/nvim/init.lua"), "-- nvim config");
    }

    #[test]
    fn pather_points_at_temp_dirs() {
        let env = TempEnvironment::builder().build();

        assert_eq!(env.paths.home_dir(), env.home);
        assert_eq!(env.paths.dotfiles_root(), env.dotfiles_root);
        assert_eq!(env.paths.data_dir(), env.data_dir);
        assert_eq!(env.paths.xdg_config_home(), env.config_home);
        assert_eq!(env.paths.app_support_dir(), env.app_support);
    }

    #[test]
    fn handler_data_dir_within_temp() {
        let env = TempEnvironment::builder().build();

        let dir = env.paths.handler_data_dir("vim", "symlink");
        assert!(
            dir.starts_with(&env.data_dir),
            "handler_data_dir {} should be under data_dir {}",
            dir.display(),
            env.data_dir.display()
        );
        assert!(dir.ends_with("packs/vim/symlink"));
    }

    #[test]
    fn assert_symlink_works() {
        let env = TempEnvironment::builder().build();

        let original = env.home.join("original.txt");
        let link = env.home.join("link.txt");
        env.fs.write_file(&original, b"content").unwrap();
        env.fs.symlink(&original, &link).unwrap();

        env.assert_symlink(&link, &original);
    }

    #[test]
    fn assert_no_handler_state_passes_when_empty() {
        let env = TempEnvironment::builder().build();

        // No state dir exists at all -- should pass
        env.assert_no_handler_state("vim", "symlink");

        // Empty state dir -- should also pass
        let dir = env.paths.handler_data_dir("vim", "symlink");
        env.fs.mkdir_all(&dir).unwrap();
        env.assert_no_handler_state("vim", "symlink");
    }

    #[test]
    #[should_panic(expected = "expected no state")]
    fn assert_no_handler_state_fails_when_state_exists() {
        let env = TempEnvironment::builder().build();

        let dir = env.paths.handler_data_dir("vim", "symlink");
        env.fs.mkdir_all(&dir).unwrap();
        env.fs.write_file(&dir.join("vimrc"), b"link").unwrap();

        env.assert_no_handler_state("vim", "symlink");
    }

    #[test]
    fn assert_sentinel_works() {
        let env = TempEnvironment::builder().build();

        let dir = env.paths.handler_data_dir("vim", "install");
        env.fs.mkdir_all(&dir).unwrap();
        env.fs
            .write_file(&dir.join("install.sh-abc123"), b"completed|2026-01-01")
            .unwrap();

        env.assert_sentinel("vim", "install", "install.sh-abc123");
    }

    #[test]
    fn multiple_environments_coexist() {
        let env1 = TempEnvironment::builder()
            .pack("a")
            .file("f1", "one")
            .done()
            .build();

        let env2 = TempEnvironment::builder()
            .pack("b")
            .file("f2", "two")
            .done()
            .build();

        // Each has its own isolated dotfiles
        env1.assert_exists(&env1.dotfiles_root.join("a/f1"));
        env1.assert_not_exists(&env1.dotfiles_root.join("b"));

        env2.assert_exists(&env2.dotfiles_root.join("b/f2"));
        env2.assert_not_exists(&env2.dotfiles_root.join("a"));

        // Different temp directories
        assert_ne!(env1.home, env2.home);
    }

    #[test]
    fn list_dir_names_helper() {
        let env = TempEnvironment::builder()
            .pack("vim")
            .file("vimrc", "")
            .file("gvimrc", "")
            .done()
            .build();

        let mut names = env.list_dir_names(&env.dotfiles_root.join("vim"));
        names.sort();
        assert_eq!(names, vec!["gvimrc", "vimrc"]);
    }

    #[test]
    fn empty_environment_has_basic_structure() {
        let env = TempEnvironment::builder().build();

        env.assert_dir_exists(&env.home);
        env.assert_dir_exists(&env.dotfiles_root);
        env.assert_dir_exists(&env.data_dir);
        env.assert_dir_exists(&env.config_home);
        env.assert_dir_exists(env.paths.shell_dir());
    }
}