1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
use serde::{Deserialize, Serialize};
use crate::commands::execution::{ActionExecution, ActionResult, ActionValue, ValueExecution};
use crate::context::PicoContext;
use crate::rules::PicoRules;
use crate::runtime::PicoRuntime;
use crate::values::{Extract, PicoValue, ValueProducer};
#[derive(Serialize, Deserialize, Debug)]
#[serde(untagged)]
pub enum Settable {
ValueProducing(String, ValueProducer),
Extractor(Extract),
}
#[derive(Serialize, Deserialize, Debug)]
pub struct SetCommand {
set: Settable,
namespaces: Option<Vec<String>>,
}
impl ActionExecution for SetCommand {
fn run_with_context(
&self,
pico_rules: &PicoRules,
runtime: &mut PicoRuntime,
ctx: &mut PicoContext,
) -> ActionResult {
info!("RUNNING SET for {}", pico_rules);
match &self.set {
Settable::Extractor(extraction) => {
let extracted_values = extraction.run_with_context(pico_rules, runtime, ctx)?;
match extracted_values {
PicoValue::Object(dict) => {
for (key, value) in dict {
ctx.local_set(&key, &value);
}
}
_ => warn!("extractor returned non Object"),
}
}
Settable::ValueProducing(var_name, value_producer) => {
trace!(
"Setting from valueproducer [{}] with {:?}",
var_name,
value_producer
);
let produced_value = value_producer.run_with_context(pico_rules, runtime, ctx)?;
debug!("Produced value = {:?}", produced_value);
trace!("available namespaces: {:?}", self.namespaces);
match &self.namespaces {
None => {}
Some(requested_namespaces) => {
for ns in requested_namespaces {
if pico_rules.is_ns_allowed(ns) {
ctx.ns_set(ns, var_name, &produced_value);
} else {
warn!("namespace {}, access denied for {}", ns, var_name);
}
}
}
}
ctx.local_set(var_name, &produced_value);
}
}
trace!("CTX now {:?}", ctx);
Ok(ActionValue::Continue)
}
}