diff --git a/CHANGELOG.md b/CHANGELOG.md
new file mode 100644
index 0000000..300ca91
--- /dev/null
+++ b/CHANGELOG.md
@@ -0,0 +1,5 @@
+# Revision history for scidb-hquery
+
+## 2.8.0.429 -- 2019-07-06
+
+* First packaged version of SciDB hquery released to git and cabal.
diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..45644ff
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,674 @@
+ GNU GENERAL PUBLIC LICENSE
+ Version 3, 29 June 2007
+
+ Copyright (C) 2007 Free Software Foundation, Inc.
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+ Preamble
+
+ The GNU General Public License is a free, copyleft license for
+software and other kinds of works.
+
+ The licenses for most software and other practical works are designed
+to take away your freedom to share and change the works. By contrast,
+the GNU General Public License is intended to guarantee your freedom to
+share and change all versions of a program--to make sure it remains free
+software for all its users. We, the Free Software Foundation, use the
+GNU General Public License for most of our software; it applies also to
+any other work released this way by its authors. You can apply it to
+your programs, too.
+
+ When we speak of free software, we are referring to freedom, not
+price. Our General Public Licenses are designed to make sure that you
+have the freedom to distribute copies of free software (and charge for
+them if you wish), that you receive source code or can get it if you
+want it, that you can change the software or use pieces of it in new
+free programs, and that you know you can do these things.
+
+ To protect your rights, we need to prevent others from denying you
+these rights or asking you to surrender the rights. Therefore, you have
+certain responsibilities if you distribute copies of the software, or if
+you modify it: responsibilities to respect the freedom of others.
+
+ For example, if you distribute copies of such a program, whether
+gratis or for a fee, you must pass on to the recipients the same
+freedoms that you received. You must make sure that they, too, receive
+or can get the source code. And you must show them these terms so they
+know their rights.
+
+ Developers that use the GNU GPL protect your rights with two steps:
+(1) assert copyright on the software, and (2) offer you this License
+giving you legal permission to copy, distribute and/or modify it.
+
+ For the developers' and authors' protection, the GPL clearly explains
+that there is no warranty for this free software. For both users' and
+authors' sake, the GPL requires that modified versions be marked as
+changed, so that their problems will not be attributed erroneously to
+authors of previous versions.
+
+ Some devices are designed to deny users access to install or run
+modified versions of the software inside them, although the manufacturer
+can do so. This is fundamentally incompatible with the aim of
+protecting users' freedom to change the software. The systematic
+pattern of such abuse occurs in the area of products for individuals to
+use, which is precisely where it is most unacceptable. Therefore, we
+have designed this version of the GPL to prohibit the practice for those
+products. If such problems arise substantially in other domains, we
+stand ready to extend this provision to those domains in future versions
+of the GPL, as needed to protect the freedom of users.
+
+ Finally, every program is threatened constantly by software patents.
+States should not allow patents to restrict development and use of
+software on general-purpose computers, but in those that do, we wish to
+avoid the special danger that patents applied to a free program could
+make it effectively proprietary. To prevent this, the GPL assures that
+patents cannot be used to render the program non-free.
+
+ The precise terms and conditions for copying, distribution and
+modification follow.
+
+ TERMS AND CONDITIONS
+
+ 0. Definitions.
+
+ "This License" refers to version 3 of the GNU General Public License.
+
+ "Copyright" also means copyright-like laws that apply to other kinds of
+works, such as semiconductor masks.
+
+ "The Program" refers to any copyrightable work licensed under this
+License. Each licensee is addressed as "you". "Licensees" and
+"recipients" may be individuals or organizations.
+
+ To "modify" a work means to copy from or adapt all or part of the work
+in a fashion requiring copyright permission, other than the making of an
+exact copy. The resulting work is called a "modified version" of the
+earlier work or a work "based on" the earlier work.
+
+ A "covered work" means either the unmodified Program or a work based
+on the Program.
+
+ To "propagate" a work means to do anything with it that, without
+permission, would make you directly or secondarily liable for
+infringement under applicable copyright law, except executing it on a
+computer or modifying a private copy. Propagation includes copying,
+distribution (with or without modification), making available to the
+public, and in some countries other activities as well.
+
+ To "convey" a work means any kind of propagation that enables other
+parties to make or receive copies. Mere interaction with a user through
+a computer network, with no transfer of a copy, is not conveying.
+
+ An interactive user interface displays "Appropriate Legal Notices"
+to the extent that it includes a convenient and prominently visible
+feature that (1) displays an appropriate copyright notice, and (2)
+tells the user that there is no warranty for the work (except to the
+extent that warranties are provided), that licensees may convey the
+work under this License, and how to view a copy of this License. If
+the interface presents a list of user commands or options, such as a
+menu, a prominent item in the list meets this criterion.
+
+ 1. Source Code.
+
+ The "source code" for a work means the preferred form of the work
+for making modifications to it. "Object code" means any non-source
+form of a work.
+
+ A "Standard Interface" means an interface that either is an official
+standard defined by a recognized standards body, or, in the case of
+interfaces specified for a particular programming language, one that
+is widely used among developers working in that language.
+
+ The "System Libraries" of an executable work include anything, other
+than the work as a whole, that (a) is included in the normal form of
+packaging a Major Component, but which is not part of that Major
+Component, and (b) serves only to enable use of the work with that
+Major Component, or to implement a Standard Interface for which an
+implementation is available to the public in source code form. A
+"Major Component", in this context, means a major essential component
+(kernel, window system, and so on) of the specific operating system
+(if any) on which the executable work runs, or a compiler used to
+produce the work, or an object code interpreter used to run it.
+
+ The "Corresponding Source" for a work in object code form means all
+the source code needed to generate, install, and (for an executable
+work) run the object code and to modify the work, including scripts to
+control those activities. However, it does not include the work's
+System Libraries, or general-purpose tools or generally available free
+programs which are used unmodified in performing those activities but
+which are not part of the work. For example, Corresponding Source
+includes interface definition files associated with source files for
+the work, and the source code for shared libraries and dynamically
+linked subprograms that the work is specifically designed to require,
+such as by intimate data communication or control flow between those
+subprograms and other parts of the work.
+
+ The Corresponding Source need not include anything that users
+can regenerate automatically from other parts of the Corresponding
+Source.
+
+ The Corresponding Source for a work in source code form is that
+same work.
+
+ 2. Basic Permissions.
+
+ All rights granted under this License are granted for the term of
+copyright on the Program, and are irrevocable provided the stated
+conditions are met. This License explicitly affirms your unlimited
+permission to run the unmodified Program. The output from running a
+covered work is covered by this License only if the output, given its
+content, constitutes a covered work. This License acknowledges your
+rights of fair use or other equivalent, as provided by copyright law.
+
+ You may make, run and propagate covered works that you do not
+convey, without conditions so long as your license otherwise remains
+in force. You may convey covered works to others for the sole purpose
+of having them make modifications exclusively for you, or provide you
+with facilities for running those works, provided that you comply with
+the terms of this License in conveying all material for which you do
+not control copyright. Those thus making or running the covered works
+for you must do so exclusively on your behalf, under your direction
+and control, on terms that prohibit them from making any copies of
+your copyrighted material outside their relationship with you.
+
+ Conveying under any other circumstances is permitted solely under
+the conditions stated below. Sublicensing is not allowed; section 10
+makes it unnecessary.
+
+ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+
+ No covered work shall be deemed part of an effective technological
+measure under any applicable law fulfilling obligations under article
+11 of the WIPO copyright treaty adopted on 20 December 1996, or
+similar laws prohibiting or restricting circumvention of such
+measures.
+
+ When you convey a covered work, you waive any legal power to forbid
+circumvention of technological measures to the extent such circumvention
+is effected by exercising rights under this License with respect to
+the covered work, and you disclaim any intention to limit operation or
+modification of the work as a means of enforcing, against the work's
+users, your or third parties' legal rights to forbid circumvention of
+technological measures.
+
+ 4. Conveying Verbatim Copies.
+
+ You may convey verbatim copies of the Program's source code as you
+receive it, in any medium, provided that you conspicuously and
+appropriately publish on each copy an appropriate copyright notice;
+keep intact all notices stating that this License and any
+non-permissive terms added in accord with section 7 apply to the code;
+keep intact all notices of the absence of any warranty; and give all
+recipients a copy of this License along with the Program.
+
+ You may charge any price or no price for each copy that you convey,
+and you may offer support or warranty protection for a fee.
+
+ 5. Conveying Modified Source Versions.
+
+ You may convey a work based on the Program, or the modifications to
+produce it from the Program, in the form of source code under the
+terms of section 4, provided that you also meet all of these conditions:
+
+ a) The work must carry prominent notices stating that you modified
+ it, and giving a relevant date.
+
+ b) The work must carry prominent notices stating that it is
+ released under this License and any conditions added under section
+ 7. This requirement modifies the requirement in section 4 to
+ "keep intact all notices".
+
+ c) You must license the entire work, as a whole, under this
+ License to anyone who comes into possession of a copy. This
+ License will therefore apply, along with any applicable section 7
+ additional terms, to the whole of the work, and all its parts,
+ regardless of how they are packaged. This License gives no
+ permission to license the work in any other way, but it does not
+ invalidate such permission if you have separately received it.
+
+ d) If the work has interactive user interfaces, each must display
+ Appropriate Legal Notices; however, if the Program has interactive
+ interfaces that do not display Appropriate Legal Notices, your
+ work need not make them do so.
+
+ A compilation of a covered work with other separate and independent
+works, which are not by their nature extensions of the covered work,
+and which are not combined with it such as to form a larger program,
+in or on a volume of a storage or distribution medium, is called an
+"aggregate" if the compilation and its resulting copyright are not
+used to limit the access or legal rights of the compilation's users
+beyond what the individual works permit. Inclusion of a covered work
+in an aggregate does not cause this License to apply to the other
+parts of the aggregate.
+
+ 6. Conveying Non-Source Forms.
+
+ You may convey a covered work in object code form under the terms
+of sections 4 and 5, provided that you also convey the
+machine-readable Corresponding Source under the terms of this License,
+in one of these ways:
+
+ a) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by the
+ Corresponding Source fixed on a durable physical medium
+ customarily used for software interchange.
+
+ b) Convey the object code in, or embodied in, a physical product
+ (including a physical distribution medium), accompanied by a
+ written offer, valid for at least three years and valid for as
+ long as you offer spare parts or customer support for that product
+ model, to give anyone who possesses the object code either (1) a
+ copy of the Corresponding Source for all the software in the
+ product that is covered by this License, on a durable physical
+ medium customarily used for software interchange, for a price no
+ more than your reasonable cost of physically performing this
+ conveying of source, or (2) access to copy the
+ Corresponding Source from a network server at no charge.
+
+ c) Convey individual copies of the object code with a copy of the
+ written offer to provide the Corresponding Source. This
+ alternative is allowed only occasionally and noncommercially, and
+ only if you received the object code with such an offer, in accord
+ with subsection 6b.
+
+ d) Convey the object code by offering access from a designated
+ place (gratis or for a charge), and offer equivalent access to the
+ Corresponding Source in the same way through the same place at no
+ further charge. You need not require recipients to copy the
+ Corresponding Source along with the object code. If the place to
+ copy the object code is a network server, the Corresponding Source
+ may be on a different server (operated by you or a third party)
+ that supports equivalent copying facilities, provided you maintain
+ clear directions next to the object code saying where to find the
+ Corresponding Source. Regardless of what server hosts the
+ Corresponding Source, you remain obligated to ensure that it is
+ available for as long as needed to satisfy these requirements.
+
+ e) Convey the object code using peer-to-peer transmission, provided
+ you inform other peers where the object code and Corresponding
+ Source of the work are being offered to the general public at no
+ charge under subsection 6d.
+
+ A separable portion of the object code, whose source code is excluded
+from the Corresponding Source as a System Library, need not be
+included in conveying the object code work.
+
+ A "User Product" is either (1) a "consumer product", which means any
+tangible personal property which is normally used for personal, family,
+or household purposes, or (2) anything designed or sold for incorporation
+into a dwelling. In determining whether a product is a consumer product,
+doubtful cases shall be resolved in favor of coverage. For a particular
+product received by a particular user, "normally used" refers to a
+typical or common use of that class of product, regardless of the status
+of the particular user or of the way in which the particular user
+actually uses, or expects or is expected to use, the product. A product
+is a consumer product regardless of whether the product has substantial
+commercial, industrial or non-consumer uses, unless such uses represent
+the only significant mode of use of the product.
+
+ "Installation Information" for a User Product means any methods,
+procedures, authorization keys, or other information required to install
+and execute modified versions of a covered work in that User Product from
+a modified version of its Corresponding Source. The information must
+suffice to ensure that the continued functioning of the modified object
+code is in no case prevented or interfered with solely because
+modification has been made.
+
+ If you convey an object code work under this section in, or with, or
+specifically for use in, a User Product, and the conveying occurs as
+part of a transaction in which the right of possession and use of the
+User Product is transferred to the recipient in perpetuity or for a
+fixed term (regardless of how the transaction is characterized), the
+Corresponding Source conveyed under this section must be accompanied
+by the Installation Information. But this requirement does not apply
+if neither you nor any third party retains the ability to install
+modified object code on the User Product (for example, the work has
+been installed in ROM).
+
+ The requirement to provide Installation Information does not include a
+requirement to continue to provide support service, warranty, or updates
+for a work that has been modified or installed by the recipient, or for
+the User Product in which it has been modified or installed. Access to a
+network may be denied when the modification itself materially and
+adversely affects the operation of the network or violates the rules and
+protocols for communication across the network.
+
+ Corresponding Source conveyed, and Installation Information provided,
+in accord with this section must be in a format that is publicly
+documented (and with an implementation available to the public in
+source code form), and must require no special password or key for
+unpacking, reading or copying.
+
+ 7. Additional Terms.
+
+ "Additional permissions" are terms that supplement the terms of this
+License by making exceptions from one or more of its conditions.
+Additional permissions that are applicable to the entire Program shall
+be treated as though they were included in this License, to the extent
+that they are valid under applicable law. If additional permissions
+apply only to part of the Program, that part may be used separately
+under those permissions, but the entire Program remains governed by
+this License without regard to the additional permissions.
+
+ When you convey a copy of a covered work, you may at your option
+remove any additional permissions from that copy, or from any part of
+it. (Additional permissions may be written to require their own
+removal in certain cases when you modify the work.) You may place
+additional permissions on material, added by you to a covered work,
+for which you have or can give appropriate copyright permission.
+
+ Notwithstanding any other provision of this License, for material you
+add to a covered work, you may (if authorized by the copyright holders of
+that material) supplement the terms of this License with terms:
+
+ a) Disclaiming warranty or limiting liability differently from the
+ terms of sections 15 and 16 of this License; or
+
+ b) Requiring preservation of specified reasonable legal notices or
+ author attributions in that material or in the Appropriate Legal
+ Notices displayed by works containing it; or
+
+ c) Prohibiting misrepresentation of the origin of that material, or
+ requiring that modified versions of such material be marked in
+ reasonable ways as different from the original version; or
+
+ d) Limiting the use for publicity purposes of names of licensors or
+ authors of the material; or
+
+ e) Declining to grant rights under trademark law for use of some
+ trade names, trademarks, or service marks; or
+
+ f) Requiring indemnification of licensors and authors of that
+ material by anyone who conveys the material (or modified versions of
+ it) with contractual assumptions of liability to the recipient, for
+ any liability that these contractual assumptions directly impose on
+ those licensors and authors.
+
+ All other non-permissive additional terms are considered "further
+restrictions" within the meaning of section 10. If the Program as you
+received it, or any part of it, contains a notice stating that it is
+governed by this License along with a term that is a further
+restriction, you may remove that term. If a license document contains
+a further restriction but permits relicensing or conveying under this
+License, you may add to a covered work material governed by the terms
+of that license document, provided that the further restriction does
+not survive such relicensing or conveying.
+
+ If you add terms to a covered work in accord with this section, you
+must place, in the relevant source files, a statement of the
+additional terms that apply to those files, or a notice indicating
+where to find the applicable terms.
+
+ Additional terms, permissive or non-permissive, may be stated in the
+form of a separately written license, or stated as exceptions;
+the above requirements apply either way.
+
+ 8. Termination.
+
+ You may not propagate or modify a covered work except as expressly
+provided under this License. Any attempt otherwise to propagate or
+modify it is void, and will automatically terminate your rights under
+this License (including any patent licenses granted under the third
+paragraph of section 11).
+
+ However, if you cease all violation of this License, then your
+license from a particular copyright holder is reinstated (a)
+provisionally, unless and until the copyright holder explicitly and
+finally terminates your license, and (b) permanently, if the copyright
+holder fails to notify you of the violation by some reasonable means
+prior to 60 days after the cessation.
+
+ Moreover, your license from a particular copyright holder is
+reinstated permanently if the copyright holder notifies you of the
+violation by some reasonable means, this is the first time you have
+received notice of violation of this License (for any work) from that
+copyright holder, and you cure the violation prior to 30 days after
+your receipt of the notice.
+
+ Termination of your rights under this section does not terminate the
+licenses of parties who have received copies or rights from you under
+this License. If your rights have been terminated and not permanently
+reinstated, you do not qualify to receive new licenses for the same
+material under section 10.
+
+ 9. Acceptance Not Required for Having Copies.
+
+ You are not required to accept this License in order to receive or
+run a copy of the Program. Ancillary propagation of a covered work
+occurring solely as a consequence of using peer-to-peer transmission
+to receive a copy likewise does not require acceptance. However,
+nothing other than this License grants you permission to propagate or
+modify any covered work. These actions infringe copyright if you do
+not accept this License. Therefore, by modifying or propagating a
+covered work, you indicate your acceptance of this License to do so.
+
+ 10. Automatic Licensing of Downstream Recipients.
+
+ Each time you convey a covered work, the recipient automatically
+receives a license from the original licensors, to run, modify and
+propagate that work, subject to this License. You are not responsible
+for enforcing compliance by third parties with this License.
+
+ An "entity transaction" is a transaction transferring control of an
+organization, or substantially all assets of one, or subdividing an
+organization, or merging organizations. If propagation of a covered
+work results from an entity transaction, each party to that
+transaction who receives a copy of the work also receives whatever
+licenses to the work the party's predecessor in interest had or could
+give under the previous paragraph, plus a right to possession of the
+Corresponding Source of the work from the predecessor in interest, if
+the predecessor has it or can get it with reasonable efforts.
+
+ You may not impose any further restrictions on the exercise of the
+rights granted or affirmed under this License. For example, you may
+not impose a license fee, royalty, or other charge for exercise of
+rights granted under this License, and you may not initiate litigation
+(including a cross-claim or counterclaim in a lawsuit) alleging that
+any patent claim is infringed by making, using, selling, offering for
+sale, or importing the Program or any portion of it.
+
+ 11. Patents.
+
+ A "contributor" is a copyright holder who authorizes use under this
+License of the Program or a work on which the Program is based. The
+work thus licensed is called the contributor's "contributor version".
+
+ A contributor's "essential patent claims" are all patent claims
+owned or controlled by the contributor, whether already acquired or
+hereafter acquired, that would be infringed by some manner, permitted
+by this License, of making, using, or selling its contributor version,
+but do not include claims that would be infringed only as a
+consequence of further modification of the contributor version. For
+purposes of this definition, "control" includes the right to grant
+patent sublicenses in a manner consistent with the requirements of
+this License.
+
+ Each contributor grants you a non-exclusive, worldwide, royalty-free
+patent license under the contributor's essential patent claims, to
+make, use, sell, offer for sale, import and otherwise run, modify and
+propagate the contents of its contributor version.
+
+ In the following three paragraphs, a "patent license" is any express
+agreement or commitment, however denominated, not to enforce a patent
+(such as an express permission to practice a patent or covenant not to
+sue for patent infringement). To "grant" such a patent license to a
+party means to make such an agreement or commitment not to enforce a
+patent against the party.
+
+ If you convey a covered work, knowingly relying on a patent license,
+and the Corresponding Source of the work is not available for anyone
+to copy, free of charge and under the terms of this License, through a
+publicly available network server or other readily accessible means,
+then you must either (1) cause the Corresponding Source to be so
+available, or (2) arrange to deprive yourself of the benefit of the
+patent license for this particular work, or (3) arrange, in a manner
+consistent with the requirements of this License, to extend the patent
+license to downstream recipients. "Knowingly relying" means you have
+actual knowledge that, but for the patent license, your conveying the
+covered work in a country, or your recipient's use of the covered work
+in a country, would infringe one or more identifiable patents in that
+country that you have reason to believe are valid.
+
+ If, pursuant to or in connection with a single transaction or
+arrangement, you convey, or propagate by procuring conveyance of, a
+covered work, and grant a patent license to some of the parties
+receiving the covered work authorizing them to use, propagate, modify
+or convey a specific copy of the covered work, then the patent license
+you grant is automatically extended to all recipients of the covered
+work and works based on it.
+
+ A patent license is "discriminatory" if it does not include within
+the scope of its coverage, prohibits the exercise of, or is
+conditioned on the non-exercise of one or more of the rights that are
+specifically granted under this License. You may not convey a covered
+work if you are a party to an arrangement with a third party that is
+in the business of distributing software, under which you make payment
+to the third party based on the extent of your activity of conveying
+the work, and under which the third party grants, to any of the
+parties who would receive the covered work from you, a discriminatory
+patent license (a) in connection with copies of the covered work
+conveyed by you (or copies made from those copies), or (b) primarily
+for and in connection with specific products or compilations that
+contain the covered work, unless you entered into that arrangement,
+or that patent license was granted, prior to 28 March 2007.
+
+ Nothing in this License shall be construed as excluding or limiting
+any implied license or other defenses to infringement that may
+otherwise be available to you under applicable patent law.
+
+ 12. No Surrender of Others' Freedom.
+
+ If conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License. If you cannot convey a
+covered work so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you may
+not convey it at all. For example, if you agree to terms that obligate you
+to collect a royalty for further conveying from those to whom you convey
+the Program, the only way you could satisfy both those terms and this
+License would be to refrain entirely from conveying the Program.
+
+ 13. Use with the GNU Affero General Public License.
+
+ Notwithstanding any other provision of this License, you have
+permission to link or combine any covered work with a work licensed
+under version 3 of the GNU Affero General Public License into a single
+combined work, and to convey the resulting work. The terms of this
+License will continue to apply to the part which is the covered work,
+but the special requirements of the GNU Affero General Public License,
+section 13, concerning interaction through a network will apply to the
+combination as such.
+
+ 14. Revised Versions of this License.
+
+ The Free Software Foundation may publish revised and/or new versions of
+the GNU General Public License from time to time. Such new versions will
+be similar in spirit to the present version, but may differ in detail to
+address new problems or concerns.
+
+ Each version is given a distinguishing version number. If the
+Program specifies that a certain numbered version of the GNU General
+Public License "or any later version" applies to it, you have the
+option of following the terms and conditions either of that numbered
+version or of any later version published by the Free Software
+Foundation. If the Program does not specify a version number of the
+GNU General Public License, you may choose any version ever published
+by the Free Software Foundation.
+
+ If the Program specifies that a proxy can decide which future
+versions of the GNU General Public License can be used, that proxy's
+public statement of acceptance of a version permanently authorizes you
+to choose that version for the Program.
+
+ Later license versions may give you additional or different
+permissions. However, no additional obligations are imposed on any
+author or copyright holder as a result of your choosing to follow a
+later version.
+
+ 15. Disclaimer of Warranty.
+
+ THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+ 16. Limitation of Liability.
+
+ IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+SUCH DAMAGES.
+
+ 17. Interpretation of Sections 15 and 16.
+
+ If the disclaimer of warranty and limitation of liability provided
+above cannot be given local legal effect according to their terms,
+reviewing courts shall apply local law that most closely approximates
+an absolute waiver of all civil liability in connection with the
+Program, unless a warranty or assumption of liability accompanies a
+copy of the Program in return for a fee.
+
+ END OF TERMS AND CONDITIONS
+
+ How to Apply These Terms to Your New Programs
+
+ If you develop a new program, and you want it to be of the greatest
+possible use to the public, the best way to achieve this is to make it
+free software which everyone can redistribute and change under these terms.
+
+ To do so, attach the following notices to the program. It is safest
+to attach them to the start of each source file to most effectively
+state the exclusion of warranty; and each file should have at least
+the "copyright" line and a pointer to where the full notice is found.
+
+
+ Copyright (C)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
+
+Also add information on how to contact you by electronic and paper mail.
+
+ If the program does terminal interaction, make it output a short
+notice like this when it starts in an interactive mode:
+
+ Copyright (C)
+ This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
+ This is free software, and you are welcome to redistribute it
+ under certain conditions; type `show c' for details.
+
+The hypothetical commands `show w' and `show c' should show the appropriate
+parts of the General Public License. Of course, your program's commands
+might be different; for a GUI interface, you would use an "about box".
+
+ You should also get your employer (if you work as a programmer) or school,
+if any, to sign a "copyright disclaimer" for the program, if necessary.
+For more information on this, and how to apply and follow the GNU GPL, see
+.
+
+ The GNU General Public License does not permit incorporating your program
+into proprietary programs. If your program is a subroutine library, you
+may consider it more useful to permit linking proprietary applications with
+the library. If this is what you want to do, use the GNU Lesser General
+Public License instead of this License. But first, please read
+.
diff --git a/Setup.hs b/Setup.hs
new file mode 100644
index 0000000..6b8ce62
--- /dev/null
+++ b/Setup.hs
@@ -0,0 +1,52 @@
+import Distribution.PackageDescription (BuildInfo)
+import Distribution.Simple (UserHooks(..),defaultMainWithHooks,simpleUserHooks)
+import Distribution.Simple.BuildPaths (autogenComponentModulesDir)
+import Distribution.Simple.LocalBuildInfo (LocalBuildInfo(..),ComponentLocalBuildInfo)
+import Distribution.Simple.PreProcess (PreProcessor(..),knownSuffixHandlers,mkSimplePreProcessor)
+import Distribution.Simple.Program (Program(..),findProgramVersion,runDbProgram,simpleProgram)
+import Distribution.Simple.Utils (info)
+import System.FilePath (takeBaseName,takeDirectory)
+
+main :: IO ()
+main =
+ defaultMainWithHooks simpleUserHooks{hookedPreProcessors = ("cf",ppBnfc):knownSuffixHandlers}
+
+ppBnfc :: BuildInfo -> LocalBuildInfo -> ComponentLocalBuildInfo -> PreProcessor
+ppBnfc _ lbi clbi =
+ PreProcessor {platformIndependent = True
+ ,runPreProcessor = mkSimplePreProcessor $ \inFile outFile verbosity ->
+ do info verbosity ("Running "++programName bnfcProgram
+ ++" --outputdir="++autogenDir
+ ++" --haskell " ++ inFile
+ )
+ runDbProgram verbosity bnfcProgram (withPrograms lbi)
+ ["--outputdir="++autogenDir, "--haskell", inFile]
+ info verbosity ("Creating "++programName bnfcProgram++" output file '"++outFile++"'"
+ ++" from input file '"++inFile++"'")
+ outFile `makeFrom` inFile
+ }
+ where autogenDir = autogenComponentModulesDir lbi clbi
+
+bnfcProgram :: Program
+bnfcProgram = (simpleProgram "bnfc") {
+ -- Invoking "bnfc --version" gives a string like "2.8.2"
+ programFindVersion = findProgramVersion "--version" id
+ }
+
+makeFrom :: String -> String -> IO ()
+makeFrom outFile inFile = do inFileStr <- readFile inFile
+ writeFile outFile (outFileStrFrom inFileStr)
+ where outFileStrFrom inFileStr =
+ "{- |\n"
+ ++"This is the SciDB AFL BNFC file:\n"
+ ++"\n"
+ ++quote inFileStr++"\n"
+ ++"-}\n"
+ ++"\n"
+ ++"module "++takeBaseName inFile++" where\n"
+ ++"\n"
+ ++"-- | BNFC configuration file as a string, for the purposes of documentation.\n"
+ ++"bnfcFile :: String\n"
+ ++"bnfcFile = "++show inFileStr++"\n"
+ quote inFileStr = unlines $ fmap ("> "++) $ lines inFileStr
+
diff --git a/scidb-hquery.cabal b/scidb-hquery.cabal
new file mode 100644
index 0000000..047321d
--- /dev/null
+++ b/scidb-hquery.cabal
@@ -0,0 +1,133 @@
+cabal-version: 2.4
+name: scidb-hquery
+version: 2.8.0.429
+license: GPL-3.0-only
+license-file: LICENSE
+copyright: All rights reserved 2014-19(c).
+maintainer: marcus@gabriel.name
+author: Marcus D. Gabriel
+homepage:
+bug-reports:
+synopsis: Haskell query for SciDB via shim
+description:
+ The command hquery with no operands and no options will begin an
+ interacitve session with a SciDB server using SciDB's shim
+ protocol at http://localhost:8080. See hquery -m for a manual
+ page and http://www.paradigm4.com/ for more infomation.
+category: Database
+build-type: Custom
+extra-source-files:
+ CHANGELOG.md
+ src/SciDbAFL.cf
+
+custom-setup
+ setup-depends: base >=4.12.0.0 && <4.13,
+ Cabal >=2.4.1.0 && <2.5,
+ filepath >=1.4.2.1 && <1.5
+
+library
+ exposed-modules:
+ Environment
+ SciDbAFL
+ ErrM
+ HQuery
+ License
+ Manual
+ Utils
+ UtilsUnsafe
+ build-tool-depends: BNFC:bnfc >=2.8.2, alex:alex >=3.2.4,
+ happy:happy >=1.19.9
+ hs-source-dirs: src
+ other-modules:
+ AbsSciDbAFL
+ Interpreter
+ LexSciDbAFL
+ ParSciDbAFL
+ PrintSciDbAFL
+ autogen-modules:
+ SciDbAFL
+ AbsSciDbAFL
+ ErrM
+ LexSciDbAFL
+ ParSciDbAFL
+ PrintSciDbAFL
+ default-language: Haskell2010
+ build-depends:
+ base >=4.12.0.0 && <4.13,
+ HTTP >=4000.3.14 && <4000.4,
+ array >=0.5.3.0 && <0.6,
+ bytestring >=0.10.8.2 && <0.11,
+ connection >=0.3.0 && <0.4,
+ cryptonite ==0.26.*,
+ data-default-class >=0.1.2.0 && <0.2,
+ exceptions >=0.10.2 && <0.11,
+ haskeline >=0.7.4.3 && <0.8,
+ hostname-validate >=1.0.0 && <1.1,
+ http-client >=0.6.4 && <0.7,
+ http-client-tls >=0.3.5.3 && <0.4,
+ http-conduit >=2.3.7.1 && <2.4,
+ http-types >=0.12.3 && <0.13,
+ memory >=0.14.18 && <0.15,
+ mtl >=2.2.2 && <2.3,
+ network >=3.1.0.1 && <3.2,
+ process >=1.6.5.0 && <1.7,
+ regex >=1.0.0.0 && <1.1,
+ safe >=0.3.17 && <0.4,
+ split >=0.2.3.3 && <0.3,
+ terminal-size >=0.3.2.1 && <0.4,
+ text >=1.2.3.1 && <1.3,
+ tls >=1.5.0 && <1.6,
+ x509-store >=1.6.7 && <1.7
+
+executable hquery
+ main-is: Main.hs
+ hs-source-dirs: src
+ other-modules:
+ SciDbAFL
+ AbsSciDbAFL
+ Environment
+ ErrM
+ HQuery
+ LexSciDbAFL
+ License
+ Manual
+ ParSciDbAFL
+ PrintSciDbAFL
+ Utils
+ UtilsUnsafe
+ autogen-modules:
+ SciDbAFL
+ AbsSciDbAFL
+ ErrM
+ LexSciDbAFL
+ ParSciDbAFL
+ PrintSciDbAFL
+ default-language: Haskell2010
+ build-depends:
+ base >=4.12.0.0 && <4.13,
+ HTTP >=4000.3.14 && <4000.4,
+ array >=0.5.3.0 && <0.6,
+ bytestring >=0.10.8.2 && <0.11,
+ connection >=0.3.0 && <0.4,
+ cryptonite ==0.26.*,
+ data-default-class >=0.1.2.0 && <0.2,
+ directory >=1.3.3.0 && <1.4,
+ exceptions >=0.10.2 && <0.11,
+ filepath >=1.4.2.1 && <1.5,
+ haskeline >=0.7.4.3 && <0.8,
+ hostname-validate >=1.0.0 && <1.1,
+ http-client >=0.6.4 && <0.7,
+ http-client-tls >=0.3.5.3 && <0.4,
+ http-conduit >=2.3.7.1 && <2.4,
+ http-types >=0.12.3 && <0.13,
+ memory >=0.14.18 && <0.15,
+ mtl >=2.2.2 && <2.3,
+ network >=3.1.0.1 && <3.2,
+ process >=1.6.5.0 && <1.7,
+ regex >=1.0.0.0 && <1.1,
+ safe >=0.3.17 && <0.4,
+ split >=0.2.3.3 && <0.3,
+ terminal-size >=0.3.2.1 && <0.4,
+ text >=1.2.3.1 && <1.3,
+ tls >=1.5.0 && <1.6,
+ x509-store >=1.6.7 && <1.7
diff --git a/src/Environment.hs b/src/Environment.hs
new file mode 100644
index 0000000..1fb18fa
--- /dev/null
+++ b/src/Environment.hs
@@ -0,0 +1,97 @@
+
+module Environment(Environment(..), defaultEnv, maybePort,Verbosity(..)) where
+
+import Data.Maybe (fromMaybe)
+import Network.HTTP.Types.Header (RequestHeaders)
+
+data Verbosity = Verbose0 -- ^ Verbosity level 0, no information to stderr
+ | VerboseDef -- ^ Default verbosity, only relevant HTTP exceptions to stderr
+ | Verbose1 -- ^ Verbosity level 1, additional HTTP exceptions and trace information to stderr
+ | Verbose2 -- ^ Verbosity level 2, additional URL information to stderr
+ deriving (Show,Eq,Ord)
+
+{- | Given an 'Environment', return a port or a default port.
+-}
+maybePort :: Environment -> String
+maybePort e = fromMaybe port' (port e)
+ where port' = (if protocol e == "https" then secPort else defPort) e
+
+-- Section: Environment
+{- |
+The 'Environment' contains the command name, operands, defaults, and the
+result of every option amongst other entries. It is set by 'main' and
+otherwise to be used as a read-only 'Environment'.
+-}
+data Environment =
+ Env { command :: String -- ^ Program name
+ , pwd :: String -- ^ Present Working Directory (PWD)
+ , home :: String -- ^ Home directory or /tmp
+ , history :: String -- ^ History file for command
+ , protocol :: String -- ^ Protoocl http or https
+ , certStore :: String -- ^ Load and use certificate store
+ , insecure :: Bool -- ^ Use "insecure" SSL/TLS, i.e., no cert validation
+ , scidbAuth :: Bool -- ^ Use SciDB authentication
+ , digestAuth :: Bool -- ^ Use basic digest access authentication
+ , digestHeaders::RequestHeaders-- ^ Digest request headers or nothing for the GET method
+ , defFetch :: Maybe Bool -- ^ True fetch lines, false do not fetch lines
+ , defFormat :: String -- ^ Format dcsv, csv, csv+, etc.
+ , defNumber :: String -- ^ Number of lines to fetch, n=0 for all; default for bad number
+ , defReadingLines::Maybe Bool -- ^ True to read lines from shim otheriwise read bytes
+ , defPrefix :: String -- ^ Prefix to execute before a query by shim
+ , host :: String -- ^ Hostname or IP address
+ , port :: Maybe String -- ^ Port number
+ , defPort :: String -- ^ Default insecure or unencypted port number
+ , secPort :: String -- ^ Default secure or encypted port number
+ , username :: String -- ^ Username
+ , password :: String -- ^ Password for username
+ , operands :: [String] -- ^ List of queries
+ , file :: String -- ^ File of queries
+ , help :: Bool -- ^ @-h@, display help summary
+ , license :: Bool -- ^ @-l@, display license terms
+ , manual :: Bool -- ^ @-m@, display internal man page
+ , version :: Bool -- ^ @-v@, display version
+ , synopsis :: Bool -- ^ @-y@, display manual synopsis
+ , verbose :: Verbosity -- ^ @-V|-V[012]@, display verbose information to stderr
+ , sciDbVersion:: String -- ^ Store SciDB version, e.g., 18.1.0
+ , versionSciDb:: Bool -- ^ True to display SciDB version via shim
+ } deriving Show
+
+-- The default Environment
+{- |
+The defualt values, otherwise updated from the flags supplied by the
+command line options. The default program name is 'hquery'.
+-}
+defaultEnv :: Environment
+defaultEnv =
+ Env { command = "hquery" -- Default program name
+ , pwd = "" -- No PWD by default
+ , home = "/tmp" -- /tmp if $HOME does not exist
+ , history = "" -- History file for command
+ , protocol = "http" -- No authentication needed for http
+ , certStore = "" -- Load and use certificate store
+ , insecure = False -- Use "insecure" SSL/TLS, i.e., no cert validation
+ , scidbAuth = False -- Use SciDB authentication
+ , digestAuth = False -- Use basic digest access authentication
+ , digestHeaders=[] -- Digest request headers or nothing for the GET method
+ , defFetch = Just True -- True fetch lines, false do not fetch lines
+ , defFormat = "dcsv" -- Format dcsv, csv, csv+, etc.
+ , defNumber = "23" -- Default 23 lines, default for bad number
+ , defReadingLines=Just True -- True to read lines from shim otheriwise read bytes
+ , defPrefix = "" -- Prefix to execute before a query by shim
+ , host = "localhost" -- Use local shim connection
+ , port = Nothing -- Nothing for default port number not needing authentication
+ , defPort = "8080" -- Default port number not needing authentication
+ , secPort = "8083" -- Default port number needing authentication
+ , username = "" -- Username needed for -d or -s option
+ , password = "" -- Password needed for -d or -s option
+ , operands = [] -- No operands by default, i.e., interactive mode
+ , file = "" -- No file of queries by default
+ , help = False -- False or off by default
+ , license = False -- False or off by default
+ , manual = False -- False or off by default
+ , synopsis = False -- False or off by default
+ , version = False -- False or off by default
+ , verbose = VerboseDef -- Default verbosity
+ , sciDbVersion= "" -- Store SciDB version, e.g., 18.1.0
+ , versionSciDb= False -- True to display SciDB version via shim
+ }
diff --git a/src/HQuery.hs b/src/HQuery.hs
new file mode 100644
index 0000000..ff7cb37
--- /dev/null
+++ b/src/HQuery.hs
@@ -0,0 +1,525 @@
+{-# LANGUAGE FlexibleContexts, OverloadedStrings, LambdaCase #-}
+
+{- |
+There is a primitive API derived after the creation of 'hquery'
+defined by the following data structures and actions:
+
+ * 'Environment', the API only uses the following fields:
+
+ * 'certStore'
+ * 'defFetch'
+ * 'defFormat'
+ * 'defNumber'
+ * 'defPrefix'
+ * 'defReadingLines'
+ * 'digestAuth'
+ * 'host'
+ * 'insecure'
+ * 'password'
+ * 'port'
+ * 'protocol'
+ * 'scidbAuth'
+ * 'username'
+ * 'verbose'
+
+ * 'Err'
+ * 'mkGlobalManagerEnv'
+ * 'runQueries'
+ * 'unsafeRunQuery'
+ * 'getSciDbVersion'
+-}
+
+module HQuery (hquery
+ ,getSciDbVersion
+ ,mkGlobalManagerEnv
+ ,runQueries
+ ,unsafeRunQuery
+ ) where
+
+import Control.Monad (unless,when)
+import Control.Monad.Catch (try,MonadCatch,MonadThrow)
+import Control.Monad.IO.Class (MonadIO)
+import Control.Monad.Reader (MonadReader,ReaderT,runReaderT,ask)
+import Control.Monad.State (StateT,evalStateT,liftIO,get,put)
+import Control.Monad.State.Class (MonadState)
+import Control.Monad.Trans (lift)
+import Data.Char (toLower)
+import Data.List (intercalate)
+import Data.Maybe (isNothing,isJust,fromJust,fromMaybe)
+import Data.X509.CertificateStore (readCertificateStore)
+import Network.Socket (withSocketsDo)
+import Network.Connection (TLSSettings(..))
+import Network.HTTP.Base (urlEncode,urlDecode)
+import Network.HTTP.Client (defaultManagerSettings,requestHeaders,defaultRequest
+ ,RequestBody,streamFile,requestBody,method,Request)
+import Network.HTTP.Client.TLS (getGlobalManager,setGlobalManager,applyDigestAuth)
+import Network.HTTP.Simple (parseRequestThrow,httpLBS,setRequestManager)
+import Network.HTTP.Conduit (HttpException(..),HttpExceptionContent(..),Response(..)
+ ,managerResponseTimeout,responseTimeoutNone,newManager
+ ,mkManagerSettings)
+import Network.HTTP.Types.Status (Status(..))
+import Safe (tailSafe,headMay)
+import System.Console.Haskeline (runInputT,defaultSettings,getInputLine,historyFile
+ ,withInterrupt,handleInterrupt,outputStrLn)
+import System.Console.Terminal.Size (Window(..),size)
+import System.Exit (exitWith,ExitCode(..))
+import System.IO (stderr,stdin,hPutStrLn,hReady,getContents)
+
+import qualified Data.Text.Lazy.Encoding as L (decodeUtf8)
+import qualified Data.Text.Lazy as L (unpack)
+import qualified Data.ByteString.Char8 as C (pack,unpack)
+import qualified Network.HTTP.Client as H (Request(..))
+
+import Environment (Environment(certStore,defFetch,defFormat,defNumber
+ ,defReadingLines,defPrefix,digestAuth
+ ,digestHeaders,file,history,host,insecure
+ ,operands,password,port,protocol,sciDbVersion
+ ,scidbAuth,username,verbose)
+ ,defaultEnv,maybePort,Verbosity(..))
+import ErrM (Err(..))
+import Interpreter (Results(..),interpret)
+import Utils (strip,wrap,nolines,cleanDoubleQuotes,replace,toSingleQuotedStr
+ ,escapeSingleQuotes,toSingleQuotedStr,checkMajorVersion)
+import UtilsUnsafe (managerSettings,valid,VALID(..))
+
+-- | The 'Param' is a structure of parameters that can change during
+-- execution. For example, see 'executeCommand'. When 'readingLines'
+-- is false, the value of ''number' is ignored and the entire output
+-- buffer is downloaded. This follows the recommendataion of the shim
+-- documentation.
+
+data Param =
+ Param {session :: String -- ^ The current session id, a number
+ ,number :: String -- ^ Number of lines to display
+ ,fetch :: Bool -- ^ Fetch lines yes (true) or no (false)
+ ,format :: String -- ^ Available base_format values are: csv, text, ...
+ -- *** + becomes %2B ***
+ -- csv - Comma separated values
+ -- csv+ - Comma separated values including coordinates
+ -- dcsv - "Display CSV", a more human-readable CSV variant
+ -- dense - A variant of 'text' suitable for dense data
+ -- sparse - A variant of 'text' suitable for sparse data
+ -- opaque - SciDB raw storage format
+ -- store - A variant of 'text' that includes overlap regions
+ -- text - SciDB native text format
+ -- tsv - Tab separated values (LinearTSV dialect)
+ -- tsv+ - Tab separated values including coordinates (LinearTSV dialect)
+ ,readingLines:: Bool -- ^ True for path /read_lines, the default, and false for /read_bytes
+ ,prefix :: String -- ^ An optional semi-colon separated, URL encoded, AFL statements to precede
+ -- a query in the same SciDB connection context. Mainly used for SciDB
+ -- namespace and role setting. There is no terminating semi-colon so
+ -- trailing semi-colons are removed.
+ ,fileBody :: Maybe RequestBody -- ^ Just send a file as a request body otherwise Nothing
+ }
+
+defaultParam = Param {session = ""
+ ,number = defNumber defaultEnv
+ ,fetch = fromJust $ defFetch defaultEnv
+ ,format = defFormat defaultEnv
+ ,readingLines = fromJust $ defReadingLines defaultEnv
+ ,prefix = ""
+ ,fileBody = Nothing
+ }
+
+initParam :: StateT Param (ReaderT Environment IO) ()
+initParam = do e <- ask
+ p <- get
+ put p{number = defNumber e
+ ,fetch = fromJust $ defFetch e
+ ,format = defFormat e
+ ,readingLines = fromJust $ defReadingLines e
+ ,prefix = defPrefix e
+ }
+
+-- | Get the version of SciDB, e.g., 18.1.0, via shim given an 'Environment'.
+
+getSciDbVersion :: Environment -> IO String
+getSciDbVersion e = withSocketsDo (runReaderT (evalStateT fetchVersion defaultParam{number="0"}) e)
+ where
+ fetchVersion = do e <- ask
+ let url = urlPrefix e ++ "/version"
+ fetchURL (verbose e) url
+
+-- | Given an 'Environment', make and set the global network manager,
+-- check for digest authorization and the SciDB version, and update
+-- the 'Environment'. Either return 'Just Environment' or 'Nothing'
+-- in the IO monad in the case of an invalid certificate store when
+-- the protocol is HTTPS and insecure validation is not used. Be
+-- careful: no resolving or verification of the 'Environment' is
+-- performed. When 'mkGlobalManagerEnv' returns 'Just Environment',
+-- this is the initialized 'Environment' to be used with the actions
+-- 'runQueries' and 'unsafeRunQuery'.
+
+mkGlobalManagerEnv :: Environment -> IO (Maybe Environment)
+mkGlobalManagerEnv env =
+ do mstore <- readCertificateStore (certStore env)
+ let defSettings = defaultManagerSettings
+ tlsSettings = mkManagerSettings (TLSSettingsSimple True False False) Nothing
+ caStore = fromJust mstore
+ caSettings = managerSettings caStore
+ s <- if protocol env /= "https"
+ then return $ Just defSettings
+ else if insecure env
+ then return $ Just tlsSettings
+ else if isJust mstore
+ then return $ Just caSettings
+ else return Nothing
+ if isNothing s
+ then return Nothing
+ else do let s' = fromJust s
+ manager <- newManager s'{managerResponseTimeout=responseTimeoutNone}
+ liftIO $ setGlobalManager manager
+ request <- maybeSetDigestAuth' env -- Used to throw HTTP exceptions early
+ let env' = env{digestHeaders = maybe [] requestHeaders request}
+ if digestAuth env
+ then do v <- getSciDbVersion env'
+ return $ Just env'{sciDbVersion=v}
+ else do v <- getSciDbVersion env
+ return $ Just env{sciDbVersion=v}
+ where
+ maybeSetDigestAuth' =
+ runReaderT (do env <- ask
+ maybeSetDigestAuth defaultRequest{H.host = C.pack $ host env
+ ,H.port = read $ maybePort env :: Int
+ ,H.secure = protocol env == "https"
+ }
+ )
+
+maybeSetDigestAuth :: (MonadReader Environment m, MonadIO m, MonadThrow n) => Request -> m (n Request)
+maybeSetDigestAuth r =
+ do e <- ask
+ m <- liftIO getGlobalManager
+ let user = C.pack $ username e
+ pass = C.pack $ password e
+ if digestAuth e
+ then liftIO $ applyDigestAuth user pass r{H.secure = protocol e == "https"} m
+ else return $ return r
+
+-- | Given an 'Environment', run a string that is one SciDB AFL
+-- query without terminating semicolon (;). The string is sent to the
+-- shim server without modification or verification. Fetch
+-- 'defNumber' lines (23 by default); an exception occurs when
+-- attempting to fetch no returned lines. If fetch is false, do not
+-- fetch any lines. For exmample, fetch should be set to false for
+-- store, create and load. See 'interpretOperatorId' in
+-- Interpreter.hs for details.
+
+unsafeRunQuery :: Environment -> String -> IO String
+unsafeRunQuery e s =
+ withSocketsDo (runReaderT (evalStateT _executeQuery defaultParam) e)
+ where _executeQuery = do initParam
+ p <- get
+ executeAndGet (fetch p) s
+
+-- | Given an 'Environment', run a string of semi-colon (;)
+-- separated SciDB AFL queries and fetch 'defNumber' lines (23 by
+-- default) from the result of each query if the query returns a
+-- result. Like 'hquery', 'runQueries' determines if the SciDB
+-- operator returns lines or not via 'interpretOperatorId' in
+-- Interpreter.hs.
+
+runQueries :: Environment -> String -> IO [Err String]
+runQueries e s =
+ withSocketsDo (runReaderT (evalStateT (executeQueries s) defaultParam) e)
+
+executeQueries :: String -> StateT Param (ReaderT Environment IO) [Err String]
+executeQueries s =
+ do initParam
+ case interpret s of
+ Ok rs -> filter (\case Ok "" -> False; _ -> True) <$> mapM executeResult rs
+ Bad s' -> return [Bad s']
+
+data ExitOrDont = ExitOnBad | DontExitOnBad deriving Eq
+
+-- | Given an 'Environment', either run the given file of queries and
+-- the operands on the command line as queries or run queries interactively.
+
+hquery :: Environment -> IO ()
+hquery e = withSocketsDo (runReaderT (evalStateT _hquery defaultParam) e)
+ where _hquery =
+ do initParam
+ e <- ask
+ r <- liftIO $ hReady stdin
+ if null (operands e) && null (file e) && not r
+ then do liftIO $ putStrLn ("SciDB version "++sciDbVersion e)
+ executeQuery DontExitOnBad "list('instances');"
+ iQuery
+ else do c <- liftIO $ if r then getContents else return ""
+ f <- liftIO $ (if null (file e) then return else readFile) (file e)
+ let a = intercalate "\n" ("":(nolines <$> operands e))
+ executeQuery ExitOnBad (c ++ f ++ a)
+ iQuery =
+ do e <- ask
+ p <- get
+ liftIO $ runInputT defaultSettings{historyFile = Just (history e)} (loop e p)
+ loop e p = withInterrupt (_loop p)
+ where
+ _loop p = handleInterrupt (outputStrLn "^C" >> _loop p) $
+ do minput <- fmap strip <$> getInput (prompt p ++ " ")
+ case minput of
+ Nothing -> return ()
+ Just "" -> _loop p
+ Just q -> do p' <- lift $ runReaderT (evalStateT (do executeQuery DontExitOnBad q
+ get
+ ) p) e
+ _loop p'
+ getInput p = getInput' p False ""
+ where getInput' p insideQuote q =
+ do mi <- getInputLine p
+ case mi of
+ Nothing -> return Nothing
+ Just "" -> return $ Just ""
+ Just l -> processInput insideQuote q l
+ processInput insideQuote q [] = getInput' "Con> " insideQuote (q++"\n")
+ processInput insideQuote q (c:cs) =
+ case c of
+ '\\' -> case headMay cs of
+ Nothing -> getInput' "Con> " insideQuote (q++[c,'\n'])
+ Just hd -> processInput insideQuote (q++[c,hd]) (tailSafe cs)
+ '\'' -> processInput (toggle insideQuote) (q++[c]) cs where toggle=not
+ ';' | insideQuote -> processInput insideQuote (q ++ [c]) cs
+ | null (strip cs) -> return $ Just (q ++ [c] ++ cs ++ "\n")
+ | otherwise -> processInput insideQuote (q ++ [c]) cs
+ _ -> processInput insideQuote (q++[c]) cs
+ prompt param = (if not (readingLines param) && fetch param then "Bytes" else show (fetch param))
+ ++"/"++format param++"/"++number param
+ ++(if null (prefix param) then "?" else "p")
+ executeQuery f s =
+ case interpret s of
+ Ok rs -> let n = length rs
+ bads = findBads rs
+ in if null bads
+ then mapM_ executeResult' rs
+ else liftIO $
+ mapM_ (\(i,r) -> putStderr ("Query "++show i++" of "++show n++": ") (show r))
+ bads
+ Bad s -> liftIO (putStderr "Input " s >> if f == DontExitOnBad then return () else exit 12)
+ findBads rs = filter (\(_,r) -> case r of BadNesting _ -> True ; _ -> False) $ zip [1..] rs
+ executeResult' r = do err <- executeResult r
+ liftIO $ case err of
+ Bad s -> putStderr "Input " s
+ Ok s -> putStr s
+
+executeResult :: Results -> StateT Param (ReaderT Environment IO) (Err String)
+executeResult r =
+ case r of
+ BadNesting s -> return $ Bad ("bad nesting " ++ toSingleQuotedStr s)
+ No s -> do executeAndGet False s
+ return $ Ok ""
+ Yes s -> do p <- get
+ if fetch p
+ then Ok <$> executeAndGet True s
+ else executeResult (No s)
+ Upload (q,ss)-> executeUpload q ss
+ Unknown s -> executeResult (Yes s)
+ _ -> do executeCommand r
+ return $ Ok ""
+ where
+ executeUpload s [] = do let q = s++";" -- Trailing semi-colon (;) needed by executeQueries
+ (intercalate "\n" <$>) . sequence <$> executeQueries q
+ executeUpload s (p:ps) =
+ do let fp = fst p
+ needle = snd p
+ b <- liftIO $ valid READABLE fp
+ if b
+ then do fetchSession
+ putVerbose "filepath to upload=" fp
+ u <- toSingleQuotedStr <$> uploadFile fp
+ putVerbose "uploaded filepath=" u
+ p <- get
+ err <- executeUpload (replace needle u s) ps
+ put p
+ releaseSession
+ return err
+ else return $ Bad ("Bad filepath '"++escapeSingleQuotes fp++"'")
+ uploadFile fp = do e <- ask
+ p <- get
+ rb <- liftIO $ streamFile fp
+ put p{fileBody=Just rb}
+ let url = urlPrefix e ++ "/upload?id=" ++ session p
+ fetchURL (verbose e) url
+ executeCommand :: (MonadIO m, MonadState Param m) => Results -> m ()
+ executeCommand r =
+ case r of
+ Command s -> case fmap toLower s of
+ "quit" -> exit 0
+ "exit" -> exit 0
+ "funs" -> liftIO $ putStrLn ( "exit - exit or quit interpreter"
+ ++ "\nfuns - list interpreter functions"
+ ++ "\nquit - quit or exit interpreter"
+ ++ "\nupload - upload a file and run a query using it"
+ ++ "\nvars - list interpreter variables and values"
+ )
+ "vars" -> do p <- get
+ liftIO $ putStrLn ( "fetch = " ++ show (fetch p)
+ ++ "\nreadinglines = " ++ show (readingLines p)
+ ++ "\nformat = " ++ format p
+ ++ "\nnumber = " ++ number p
+ ++ "\nprefix = " ++ prefix p
+ )
+ _ -> liftIO $ putStderr "Ignored unknown command: " s
+ Fetch mb -> unless (isNothing mb) $ do p <- get
+ put $ p{fetch=fromJust mb}
+ Format ms -> unless (isNothing ms) $ do p <- get
+ put $ p{format=fromJust ms}
+ Lines mi -> unless (isNothing mi) $ do p <- get
+ put $ p{number=show$fromJust mi}
+ ReadingLines mb -> unless (isNothing mb) $ do p <- get
+ put p{readingLines=fromJust mb}
+ Prefix s -> do p <- get
+ put p{prefix=s}
+
+executeAndGet :: Bool -> String -> StateT Param (ReaderT Environment IO) String
+executeAndGet f s =
+ do fetchSession
+ e <- ask
+ p <- get
+ let url = urlPrefix e ++ "/execute_query?id=" ++ session p ++ addPrefix p ++ "&query=" ++ urlEncode s
+ ++ (if f then "&save=" ++ urlEncode (format p) else "") ++ addAuthCode e
+ putVerbose "execute_query=" s
+ fetchURL (verbose e) url
+ d <- if f then readData else return ""
+ releaseSession
+ return d
+ where
+ addPrefix p = if null (prefix p) then "" else "&prefix=" ++ prefix p
+ readData =
+ do e <- ask
+ p <- get
+ let url = urlPrefix e ++ (if readingLines p then "/read_lines" else "/read_bytes")
+ ++ "?id=" ++ session p
+ ++ "&n=" ++ (if readingLines p then number p else "0")
+ v = quietIfDef (verbose e)
+ fetchURL v url
+
+fetchURL :: (MonadReader Environment m, MonadState Param m, MonadIO m, MonadCatch m)
+ => Verbosity -> String -> m String
+fetchURL v s =
+ do env <- ask
+ r <- try (continueHttp s)
+ case r of
+ Left e -> do let prefix = "SciDB " ++ sciDbVersion env ++ " URL exception\n "
+ when (v > Verbose0) $ liftIO $ putHttpException prefix s e
+ return ""
+ Right b -> do when (v > Verbose1) $ liftIO $ putStderr "URL=" s
+ return $ L.unpack $ L.decodeUtf8 b
+ where continueHttp s =
+ do e <- ask
+ p <- get
+ request <- parseRequestThrow s
+ let request'=request{requestHeaders=digestHeaders e++requestHeaders request}
+ response <- if isNothing (fileBody p)
+ then httpLBS request'
+ else do -- The digest for the POST method apparently depends on the requestBody(?)
+ mrequest <- maybeSetDigestAuth request{method="POST",requestBody=fromJust$fileBody p}
+ httpLBS $ fromMaybe request' mrequest
+ return (responseBody response)
+ putHttpException prefix s e =
+ do putStderr prefix s
+ putStderr (tailSafe $ dropWhile (/='\n') prefix) (urlDecode s)
+ case e of
+ InvalidUrlException url reason -> putStderr (url ++ ": ") reason
+ HttpExceptionRequest req e ->
+ do w <- maybe consoleWidth width <$> size
+ case e of
+ StatusCodeException responseBody s ->
+ do let status = responseStatus responseBody
+ putStderr "HTTP code = " $ show $ statusCode status
+ let m = statusMessage status
+ putStderr " message = " $ C.unpack m
+ putStderr response_ $ format w i0 $ C.unpack s
+ when (unauthorized == m) (exit 10)
+ when (noSciDBconnect == s) (exit 11)
+ TooManyRedirects _ -> putStderr "TooManyRedirects" "" >> exit 8
+ OverlongHeaders -> putStderr "OverlongHeaders" "" >> exit 8
+ ResponseTimeout -> putStderr "ResponseTimeout" ""
+ ConnectionTimeout -> putStderr "ConnectionTimeout" ""
+ ConnectionFailure _ -> putStderr "ConnectionFailure" ""
+ InvalidStatusLine _ -> putStderr "InvalidStatusLine" "" >> exit 8
+ InvalidHeader _ -> putStderr "InvalidHeader" "" >> exit 8
+ InvalidRequestHeader _ -> putStderr "InvalidRequestHeader" "" >> exit 8
+ InternalException _ -> putStderr internalException (format w i1 $ cleanDoubleQuotes $ show e) >> exit 8
+ ProxyConnectException{} -> putStderr "ProxyConnectException" "" >> exit 8
+ NoResponseDataReceived -> putStderr "NoResponseDataReceived" ""
+ TlsNotSupported -> putStderr "TlsNotSupported" "" >> exit 8
+ WrongRequestBodyStreamSize _ _ -> putStderr "WrongRequestBodyStreamSize" "" >> exit 8
+ ResponseBodyTooShort _ _ -> putStderr "ResponseBodyTooShort" "" >> exit 8
+ InvalidChunkHeaders -> putStderr "InvalidChunkHeaders" "" >> exit 8
+ IncompleteHeaders -> putStderr "IncompleteHeaders" "" >> exit 8
+ InvalidDestinationHost _ -> putStderr "InvalidDestinationHost" "" >> exit 8
+ HttpZlibException _ -> putStderr "HttpZlibException" ""
+ InvalidProxyEnvironmentVariable _ _ -> putStderr "InvalidProxyEnvironmentVariable" "" >> exit 8
+ ConnectionClosed -> putStderr "ConnectionClosed" ""
+ InvalidProxySettings _ -> putStderr "InvalidProxySettings" "" >> exit 8
+ where response_ = " response = "
+ internalException = "InternalException: " :: String {- Why is this needed? -}
+ i0 = length response_
+ i1 = length internalException
+ unauthorized = C.pack "Unauthorized"
+ noSciDBconnect = C.pack "Could not connect to SciDB"
+ -- Console terminal default width is 80 characters
+ consoleWidth = 80
+ format w i s = (intercalate "\n" . indent) ls
+ where ls = (concatMap (wrap l) . lines) s
+ l = max consoleWidth w - i
+ indent [] = []
+ indent ls = hd:((ss++) <$> tl)
+ where hd = head ls
+ tl = tail ls
+ ss = replicate i ' '
+
+fetchSession :: StateT Param (ReaderT Environment IO) ()
+fetchSession =
+ do e <- ask
+ p <- get
+ let url = urlPrefix e ++ "/new_session" ++ addAuthCode e
+ s <- fetchURL (verbose e) url
+ put p{session = strip s}
+ p' <- get
+ putVerbose "session=" (session p')
+ where addAuthCode e = if scidbAuth e && checkMajorVersion (>=19) (sciDbVersion e)
+ then "?user=" ++ username e ++ "&password=" ++ password e
+ else ""
+
+releaseSession :: StateT Param (ReaderT Environment IO) ()
+releaseSession =
+ do e <- ask
+ p <- get
+ let url = urlPrefix e ++ "/release_session?id=" ++ session p
+ v = quietIfDef (verbose e)
+ s <- fetchURL v url
+ putVerbose "release_session=" (session p ++ s)
+
+-- Not used: for documentation purposes
+cancelSession :: StateT Param (ReaderT Environment IO) ()
+cancelSession =
+ do e <- ask
+ p <- get
+ let url = urlPrefix e ++ "/cancel?id=" ++ session p ++ addAuthCode e
+ v = quietIfDef (verbose e)
+ s <- fetchURL v url
+ putVerbose "cancel_session=" (session p ++ s)
+
+addAuthCode :: Environment -> String
+addAuthCode e = if scidbAuth e && checkMajorVersion (18>=) (sciDbVersion e)
+ then "&user=" ++ username e ++ "&password=" ++ password e
+ else ""
+
+putVerbose :: (MonadReader Environment m, MonadIO m) => String -> String -> m ()
+putVerbose s t = do e <- ask
+ when (verbose e > VerboseDef) (putStderr s t)
+
+quietIfDef :: Verbosity -> Verbosity
+quietIfDef v = if v /= VerboseDef then v else Verbose0
+
+urlPrefix :: Environment -> String
+urlPrefix env = protocol' ++ "://" ++ host' ++ ":" ++ port'
+ where protocol' = protocol env
+ host' = host env
+ port' = maybePort env
+
+putStderr :: MonadIO m => String -> String -> m ()
+putStderr s t = unless (null t) $ liftIO $ hPutStrLn stderr (s++t)
+
+exit :: MonadIO m => Int -> m a
+exit i = liftIO $ exitWith $ if i == 0 then ExitSuccess else ExitFailure i
diff --git a/src/Interpreter.hs b/src/Interpreter.hs
new file mode 100644
index 0000000..8ecd837
--- /dev/null
+++ b/src/Interpreter.hs
@@ -0,0 +1,222 @@
+{-# LANGUAGE QuasiQuotes #-}
+{- |
+The 'hquery' command via 'interpret' is based on the BNFC language defined
+by [SciDbAFL.cf](SciDbAFL.html).
+-}
+module Interpreter(Results(..)
+ ,interpret
+ ) where
+
+import Data.Char (toLower)
+import Data.List (nub)
+import System.IO (stderr,hPutStrLn)
+import Text.RE.TDFA.String ((*=~),matches,re)
+
+import AbsSciDbAFL (AFL(..),Query(..),Exp(..),Id(..),AString(..))
+import ErrM (Err(..))
+import ParSciDbAFL (myLexer,pAFL)
+import PrintSciDbAFL (printTree)
+import Utils (deEscapeSingleQuotes,stripUsing,toDoubleQuotedStr,)
+
+data Results = Yes String -- ^ One can fetch a result if desired; it
+ -- is not an error to do so
+ | No String -- ^ One cannot and should not fetch a
+ -- result; it is an error to do so
+ | Unknown String -- ^ Unknown, possible user query
+ -- operator; could be Yes or No
+ | BadNesting String -- ^ An argument query contains a No
+ -- query; they should only contain
+ -- Yes or Unknown queries
+ | Command String -- ^ Command to be executed by hquery
+ | Fetch (Maybe Bool) -- ^ Fetch lines: true (yes) or
+ -- false (no); Nothing means no
+ -- change
+ | Format (Maybe String) -- ^ Format string, e.g., dcsv,
+ -- csv+ (csv%2B); Nothing means
+ -- no change
+ | Lines (Maybe Integer) -- ^ Number of lines to fetch;
+ -- Nothing means no change
+ | ReadingLines (Maybe Bool) -- ^ Reading lines: true to
+ -- read lines and false to
+ -- read bytes; Nothing means
+ -- no change
+ | Prefix String -- ^ An optional semi-colon separated,
+ -- URL encoded, AFL statements to precede
+ -- a query in the same SciDB connection
+ -- context. Mainly used for SciDB
+ -- namespace and role setting. There is
+ -- no terminating semi-colon so trailing
+ -- semi-colons are removed.
+ | Upload (String,[(FilePath,String)])
+ -- ^ The first String is the query with uploads
+ -- to perform and without a trailing semi-colon
+ -- (;). The FilePath is the file to upload and
+ -- the second String is the String to replace
+ -- with the uploaded filepath, a single quoted
+ -- SciDB string.
+ deriving (Eq, Ord, Show, Read)
+
+-- | Return a list of results as an 'Err'.
+interpret :: String -> Err [Results]
+interpret s =
+ let err = pAFL $ myLexer s
+ in case err of
+ Ok (Queries qs) -> let qs' = filter (/=QueryNil) qs
+ in Ok (fmap interpretQuery qs')
+ Bad s' -> Bad s'
+
+interpretQuery :: Query -> Results
+interpretQuery q =
+ case q of
+ QueryNil -> No ""
+ QueryArray{} -> No s
+ QueryTemp{} -> No s
+ QueryExp exp -> interpretExp exp
+ where
+ s = printTree q
+ interpretExp exp = case exp of
+ EFunc id es | any no es -> BadNesting s
+ | any up es -> Upload (s,uploadMatches s)
+ | otherwise -> interpretId id
+ EVar (Id var) -> Command var
+ Eeq a b -> interpretEeq a b
+ _ -> Unknown s
+ interpretId (Id id) = interpretFuncId id s
+ no e = case e of
+ EFunc id es -> bad id || any no es
+ _ -> False
+ bad (Id id) = interpretFuncId id "" == No ""
+ up e = case e of
+ EFunc id es -> anUp id es || any up es
+ _ -> False
+ anUp (Id id) [EString (AString _)] = fmap toLower id == "upload"
+ anUp _ _ = False
+ interpretEeq a b = case a of
+ EVar (Id var) -> interpretVar var b
+ _ -> Unknown s
+ interpretVar var b = case fmap toLower var of
+ "fetch" -> case b of
+ ETrue _ -> Fetch $ Just True
+ EFalse _ -> Fetch $ Just False
+ _ -> Fetch Nothing
+ "format" -> case b of
+ EString (AString str) -> Format $ Just $ toDoubleQuotedStr str
+ _ -> Format Nothing
+ "n" -> case b of
+ EInt n -> Lines $ Just n
+ _ -> Lines Nothing
+ "readinglines" -> case b of
+ ETrue _ -> ReadingLines $ Just True
+ EFalse _ -> ReadingLines $ Just False
+ _ -> ReadingLines Nothing
+ "prefix" -> case b of
+ EString (AString str) -> Prefix
+ $ deEscapeSingleQuotes
+ $ stripUsing (\c -> c=='\'' || c==';') str
+ _ -> Unknown s
+
+
+uploadMatches :: String -> [(FilePath,String)]
+uploadMatches s = fmap pair $ nub $ matches $ s *=~ uploadRe
+ where
+ uploadRe = [re|[Uu][Pp][Ll][Oo][Aa][Dd][[:space:]]*[(][[:space:]]*'([^']|\\')*'[[:space:]]*[)]|]
+ pair s = ((tail . dropWhile (/='\'') . reverse . tail . dropWhile (/='\'') . reverse) s, s)
+
+-- Determined by experience and particular to shim
+interpretFuncId :: String -> (String -> Results)
+interpretFuncId id =
+ case fmap toLower id of
+ "add_instances" -> No
+ "add_user_to_role" -> No
+ "aggregate" -> Yes
+ "apply" -> Yes
+ "attributes" -> Yes
+ "avg_rank" -> Yes
+ "bernoulli" -> Yes
+ "between" -> Yes
+ "build" -> Yes
+ "cancel" -> No
+ "cast" -> Yes
+ "change_user" -> No
+ "consume" -> No
+ "create_namespace" -> No
+ "create_role" -> No
+ "create_user" -> No
+ "cross_between" -> Yes
+ "cross_join" -> Yes
+ "cumulate" -> Yes
+ "delete" -> Yes
+ "dimensions" -> Yes
+ "drop_namespace" -> No
+ "drop_role" -> No
+ "drop_role_for_user" -> No
+ "drop_user" -> No
+ "drop_user_from_role" -> No
+ "filter" -> Yes
+ "gemm" -> Yes
+ "gesvd" -> Yes
+ "glm" -> Yes
+ "help" -> Yes
+ "index_lookup" -> Yes
+ "input" -> Yes
+ "insert" -> Yes
+ "join" -> Yes
+ "kendall" -> Yes
+ "limit" -> Yes
+ "list" -> Yes
+ "list_array_residency" -> Yes
+ "list_instances" -> Yes
+ "load" -> No
+ "load_module" -> No
+ "load_library" -> No
+ "merge" -> Yes
+ "move_array_to_namespace" -> No
+ "mpi_init" -> No
+ "pearson" -> Yes
+ "project" -> Yes
+ "quantile" -> Yes
+ "rank" -> Yes
+ "redimension" -> Yes
+ "redistribute" -> Yes
+ "regrid" -> Yes
+ "remove" -> No
+ "remove_instances" -> No
+ "remove_versions" -> No
+ "rename" -> No
+ "repart" -> Yes
+ "reshape" -> Yes
+ "rng_uniform" -> Yes
+ "save" -> No
+ "scan" -> Yes
+ "set_namespace" -> No
+ "set_role_permissions" -> No
+ "show" -> Yes
+ "show_namespace" -> Yes
+ "show_role_permissions" -> Yes
+ "show_roles_for_user" -> Yes
+ "show_user" -> Yes
+ "show_user_in_role" -> Yes
+ "slice" -> Yes
+ "sort" -> Yes
+ "spearman" -> Yes
+ "spgemm" -> Yes
+ "stats_instance" -> Yes
+ "stats_instance_reset" -> No
+ "stats_query" -> Yes
+ "store" -> No
+ "subarray" -> Yes
+ "substitute" -> Yes
+ "summarize" -> Yes
+ "sync" -> No
+ "transpose" -> Yes
+ "tsvd" -> Yes
+ "unfold" -> Yes
+ "uniq" -> Yes
+ "unload_library" -> No
+ "unpack" -> Yes
+ "unregister_instances" -> No
+ "variable_window" -> Yes
+ "versions" -> Yes
+ "window" -> Yes
+ "xgrid" -> Yes
+ _ -> Unknown
diff --git a/src/License.hs b/src/License.hs
new file mode 100644
index 0000000..0504efd
--- /dev/null
+++ b/src/License.hs
@@ -0,0 +1,691 @@
+module License(putLicense) where
+
+import System.Exit (exitWith)
+import UtilsUnsafe (putOrPageStrLn)
+
+-- | Display the license terms (GNU GPLv3).
+
+putLicense :: IO ()
+putLicense = putOrPageStrLn gpl30License >>= exitWith
+
+-- | Derived from gpl-3.0.txt (GNU GENERAL PUBLIC LICENSE, Version 3,
+-- 29 June 2007).
+
+gpl30License :: String
+gpl30License =
+ " License terms: GNU GPL version 3 or any later version\n"++
+ "\n"++
+ " GNU GENERAL PUBLIC LICENSE\n"++
+ " Version 3, 29 June 2007\n"++
+ "\n"++
+ " Copyright (C) 2007 Free Software Foundation, Inc. \n"++
+ " Everyone is permitted to copy and distribute verbatim copies\n"++
+ " of this license document, but changing it is not allowed.\n"++
+ "\n"++
+ " Preamble\n"++
+ "\n"++
+ " The GNU General Public License is a free, copyleft license for\n"++
+ "software and other kinds of works.\n"++
+ "\n"++
+ " The licenses for most software and other practical works are designed\n"++
+ "to take away your freedom to share and change the works. By contrast,\n"++
+ "the GNU General Public License is intended to guarantee your freedom to\n"++
+ "share and change all versions of a program--to make sure it remains free\n"++
+ "software for all its users. We, the Free Software Foundation, use the\n"++
+ "GNU General Public License for most of our software; it applies also to\n"++
+ "any other work released this way by its authors. You can apply it to\n"++
+ "your programs, too.\n"++
+ "\n"++
+ " When we speak of free software, we are referring to freedom, not\n"++
+ "price. Our General Public Licenses are designed to make sure that you\n"++
+ "have the freedom to distribute copies of free software (and charge for\n"++
+ "them if you wish), that you receive source code or can get it if you\n"++
+ "want it, that you can change the software or use pieces of it in new\n"++
+ "free programs, and that you know you can do these things.\n"++
+ "\n"++
+ " To protect your rights, we need to prevent others from denying you\n"++
+ "these rights or asking you to surrender the rights. Therefore, you have\n"++
+ "certain responsibilities if you distribute copies of the software, or if\n"++
+ "you modify it: responsibilities to respect the freedom of others.\n"++
+ "\n"++
+ " For example, if you distribute copies of such a program, whether\n"++
+ "gratis or for a fee, you must pass on to the recipients the same\n"++
+ "freedoms that you received. You must make sure that they, too, receive\n"++
+ "or can get the source code. And you must show them these terms so they\n"++
+ "know their rights.\n"++
+ "\n"++
+ " Developers that use the GNU GPL protect your rights with two steps:\n"++
+ "(1) assert copyright on the software, and (2) offer you this License\n"++
+ "giving you legal permission to copy, distribute and/or modify it.\n"++
+ "\n"++
+ " For the developers' and authors' protection, the GPL clearly explains\n"++
+ "that there is no warranty for this free software. For both users' and\n"++
+ "authors' sake, the GPL requires that modified versions be marked as\n"++
+ "changed, so that their problems will not be attributed erroneously to\n"++
+ "authors of previous versions.\n"++
+ "\n"++
+ " Some devices are designed to deny users access to install or run\n"++
+ "modified versions of the software inside them, although the manufacturer\n"++
+ "can do so. This is fundamentally incompatible with the aim of\n"++
+ "protecting users' freedom to change the software. The systematic\n"++
+ "pattern of such abuse occurs in the area of products for individuals to\n"++
+ "use, which is precisely where it is most unacceptable. Therefore, we\n"++
+ "have designed this version of the GPL to prohibit the practice for those\n"++
+ "products. If such problems arise substantially in other domains, we\n"++
+ "stand ready to extend this provision to those domains in future versions\n"++
+ "of the GPL, as needed to protect the freedom of users.\n"++
+ "\n"++
+ " Finally, every program is threatened constantly by software patents.\n"++
+ "States should not allow patents to restrict development and use of\n"++
+ "software on general-purpose computers, but in those that do, we wish to\n"++
+ "avoid the special danger that patents applied to a free program could\n"++
+ "make it effectively proprietary. To prevent this, the GPL assures that\n"++
+ "patents cannot be used to render the program non-free.\n"++
+ "\n"++
+ " The precise terms and conditions for copying, distribution and\n"++
+ "modification follow.\n"++
+ "\n"++
+ " TERMS AND CONDITIONS\n"++
+ "\n"++
+ " 0. Definitions.\n"++
+ "\n"++
+ " \"This License\" refers to version 3 of the GNU General Public License.\n"++
+ "\n"++
+ " \"Copyright\" also means copyright-like laws that apply to other kinds of\n"++
+ "works, such as semiconductor masks.\n"++
+ "\n"++
+ " \"The Program\" refers to any copyrightable work licensed under this\n"++
+ "License. Each licensee is addressed as \"you\". \"Licensees\" and\n"++
+ "\"recipients\" may be individuals or organizations.\n"++
+ "\n"++
+ " To \"modify\" a work means to copy from or adapt all or part of the work\n"++
+ "in a fashion requiring copyright permission, other than the making of an\n"++
+ "exact copy. The resulting work is called a \"modified version\" of the\n"++
+ "earlier work or a work \"based on\" the earlier work.\n"++
+ "\n"++
+ " A \"covered work\" means either the unmodified Program or a work based\n"++
+ "on the Program.\n"++
+ "\n"++
+ " To \"propagate\" a work means to do anything with it that, without\n"++
+ "permission, would make you directly or secondarily liable for\n"++
+ "infringement under applicable copyright law, except executing it on a\n"++
+ "computer or modifying a private copy. Propagation includes copying,\n"++
+ "distribution (with or without modification), making available to the\n"++
+ "public, and in some countries other activities as well.\n"++
+ "\n"++
+ " To \"convey\" a work means any kind of propagation that enables other\n"++
+ "parties to make or receive copies. Mere interaction with a user through\n"++
+ "a computer network, with no transfer of a copy, is not conveying.\n"++
+ "\n"++
+ " An interactive user interface displays \"Appropriate Legal Notices\"\n"++
+ "to the extent that it includes a convenient and prominently visible\n"++
+ "feature that (1) displays an appropriate copyright notice, and (2)\n"++
+ "tells the user that there is no warranty for the work (except to the\n"++
+ "extent that warranties are provided), that licensees may convey the\n"++
+ "work under this License, and how to view a copy of this License. If\n"++
+ "the interface presents a list of user commands or options, such as a\n"++
+ "menu, a prominent item in the list meets this criterion.\n"++
+ "\n"++
+ " 1. Source Code.\n"++
+ "\n"++
+ " The \"source code\" for a work means the preferred form of the work\n"++
+ "for making modifications to it. \"Object code\" means any non-source\n"++
+ "form of a work.\n"++
+ "\n"++
+ " A \"Standard Interface\" means an interface that either is an official\n"++
+ "standard defined by a recognized standards body, or, in the case of\n"++
+ "interfaces specified for a particular programming language, one that\n"++
+ "is widely used among developers working in that language.\n"++
+ "\n"++
+ " The \"System Libraries\" of an executable work include anything, other\n"++
+ "than the work as a whole, that (a) is included in the normal form of\n"++
+ "packaging a Major Component, but which is not part of that Major\n"++
+ "Component, and (b) serves only to enable use of the work with that\n"++
+ "Major Component, or to implement a Standard Interface for which an\n"++
+ "implementation is available to the public in source code form. A\n"++
+ "\"Major Component\", in this context, means a major essential component\n"++
+ "(kernel, window system, and so on) of the specific operating system\n"++
+ "(if any) on which the executable work runs, or a compiler used to\n"++
+ "produce the work, or an object code interpreter used to run it.\n"++
+ "\n"++
+ " The \"Corresponding Source\" for a work in object code form means all\n"++
+ "the source code needed to generate, install, and (for an executable\n"++
+ "work) run the object code and to modify the work, including scripts to\n"++
+ "control those activities. However, it does not include the work's\n"++
+ "System Libraries, or general-purpose tools or generally available free\n"++
+ "programs which are used unmodified in performing those activities but\n"++
+ "which are not part of the work. For example, Corresponding Source\n"++
+ "includes interface definition files associated with source files for\n"++
+ "the work, and the source code for shared libraries and dynamically\n"++
+ "linked subprograms that the work is specifically designed to require,\n"++
+ "such as by intimate data communication or control flow between those\n"++
+ "subprograms and other parts of the work.\n"++
+ "\n"++
+ " The Corresponding Source need not include anything that users\n"++
+ "can regenerate automatically from other parts of the Corresponding\n"++
+ "Source.\n"++
+ "\n"++
+ " The Corresponding Source for a work in source code form is that\n"++
+ "same work.\n"++
+ "\n"++
+ " 2. Basic Permissions.\n"++
+ "\n"++
+ " All rights granted under this License are granted for the term of\n"++
+ "copyright on the Program, and are irrevocable provided the stated\n"++
+ "conditions are met. This License explicitly affirms your unlimited\n"++
+ "permission to run the unmodified Program. The output from running a\n"++
+ "covered work is covered by this License only if the output, given its\n"++
+ "content, constitutes a covered work. This License acknowledges your\n"++
+ "rights of fair use or other equivalent, as provided by copyright law.\n"++
+ "\n"++
+ " You may make, run and propagate covered works that you do not\n"++
+ "convey, without conditions so long as your license otherwise remains\n"++
+ "in force. You may convey covered works to others for the sole purpose\n"++
+ "of having them make modifications exclusively for you, or provide you\n"++
+ "with facilities for running those works, provided that you comply with\n"++
+ "the terms of this License in conveying all material for which you do\n"++
+ "not control copyright. Those thus making or running the covered works\n"++
+ "for you must do so exclusively on your behalf, under your direction\n"++
+ "and control, on terms that prohibit them from making any copies of\n"++
+ "your copyrighted material outside their relationship with you.\n"++
+ "\n"++
+ " Conveying under any other circumstances is permitted solely under\n"++
+ "the conditions stated below. Sublicensing is not allowed; section 10\n"++
+ "makes it unnecessary.\n"++
+ "\n"++
+ " 3. Protecting Users' Legal Rights From Anti-Circumvention Law.\n"++
+ "\n"++
+ " No covered work shall be deemed part of an effective technological\n"++
+ "measure under any applicable law fulfilling obligations under article\n"++
+ "11 of the WIPO copyright treaty adopted on 20 December 1996, or\n"++
+ "similar laws prohibiting or restricting circumvention of such\n"++
+ "measures.\n"++
+ "\n"++
+ " When you convey a covered work, you waive any legal power to forbid\n"++
+ "circumvention of technological measures to the extent such circumvention\n"++
+ "is effected by exercising rights under this License with respect to\n"++
+ "the covered work, and you disclaim any intention to limit operation or\n"++
+ "modification of the work as a means of enforcing, against the work's\n"++
+ "users, your or third parties' legal rights to forbid circumvention of\n"++
+ "technological measures.\n"++
+ "\n"++
+ " 4. Conveying Verbatim Copies.\n"++
+ "\n"++
+ " You may convey verbatim copies of the Program's source code as you\n"++
+ "receive it, in any medium, provided that you conspicuously and\n"++
+ "appropriately publish on each copy an appropriate copyright notice;\n"++
+ "keep intact all notices stating that this License and any\n"++
+ "non-permissive terms added in accord with section 7 apply to the code;\n"++
+ "keep intact all notices of the absence of any warranty; and give all\n"++
+ "recipients a copy of this License along with the Program.\n"++
+ "\n"++
+ " You may charge any price or no price for each copy that you convey,\n"++
+ "and you may offer support or warranty protection for a fee.\n"++
+ "\n"++
+ " 5. Conveying Modified Source Versions.\n"++
+ "\n"++
+ " You may convey a work based on the Program, or the modifications to\n"++
+ "produce it from the Program, in the form of source code under the\n"++
+ "terms of section 4, provided that you also meet all of these conditions:\n"++
+ "\n"++
+ " a) The work must carry prominent notices stating that you modified\n"++
+ " it, and giving a relevant date.\n"++
+ "\n"++
+ " b) The work must carry prominent notices stating that it is\n"++
+ " released under this License and any conditions added under section\n"++
+ " 7. This requirement modifies the requirement in section 4 to\n"++
+ " \"keep intact all notices\".\n"++
+ "\n"++
+ " c) You must license the entire work, as a whole, under this\n"++
+ " License to anyone who comes into possession of a copy. This\n"++
+ " License will therefore apply, along with any applicable section 7\n"++
+ " additional terms, to the whole of the work, and all its parts,\n"++
+ " regardless of how they are packaged. This License gives no\n"++
+ " permission to license the work in any other way, but it does not\n"++
+ " invalidate such permission if you have separately received it.\n"++
+ "\n"++
+ " d) If the work has interactive user interfaces, each must display\n"++
+ " Appropriate Legal Notices; however, if the Program has interactive\n"++
+ " interfaces that do not display Appropriate Legal Notices, your\n"++
+ " work need not make them do so.\n"++
+ "\n"++
+ " A compilation of a covered work with other separate and independent\n"++
+ "works, which are not by their nature extensions of the covered work,\n"++
+ "and which are not combined with it such as to form a larger program,\n"++
+ "in or on a volume of a storage or distribution medium, is called an\n"++
+ "\"aggregate\" if the compilation and its resulting copyright are not\n"++
+ "used to limit the access or legal rights of the compilation's users\n"++
+ "beyond what the individual works permit. Inclusion of a covered work\n"++
+ "in an aggregate does not cause this License to apply to the other\n"++
+ "parts of the aggregate.\n"++
+ "\n"++
+ " 6. Conveying Non-Source Forms.\n"++
+ "\n"++
+ " You may convey a covered work in object code form under the terms\n"++
+ "of sections 4 and 5, provided that you also convey the\n"++
+ "machine-readable Corresponding Source under the terms of this License,\n"++
+ "in one of these ways:\n"++
+ "\n"++
+ " a) Convey the object code in, or embodied in, a physical product\n"++
+ " (including a physical distribution medium), accompanied by the\n"++
+ " Corresponding Source fixed on a durable physical medium\n"++
+ " customarily used for software interchange.\n"++
+ "\n"++
+ " b) Convey the object code in, or embodied in, a physical product\n"++
+ " (including a physical distribution medium), accompanied by a\n"++
+ " written offer, valid for at least three years and valid for as\n"++
+ " long as you offer spare parts or customer support for that product\n"++
+ " model, to give anyone who possesses the object code either (1) a\n"++
+ " copy of the Corresponding Source for all the software in the\n"++
+ " product that is covered by this License, on a durable physical\n"++
+ " medium customarily used for software interchange, for a price no\n"++
+ " more than your reasonable cost of physically performing this\n"++
+ " conveying of source, or (2) access to copy the\n"++
+ " Corresponding Source from a network server at no charge.\n"++
+ "\n"++
+ " c) Convey individual copies of the object code with a copy of the\n"++
+ " written offer to provide the Corresponding Source. This\n"++
+ " alternative is allowed only occasionally and noncommercially, and\n"++
+ " only if you received the object code with such an offer, in accord\n"++
+ " with subsection 6b.\n"++
+ "\n"++
+ " d) Convey the object code by offering access from a designated\n"++
+ " place (gratis or for a charge), and offer equivalent access to the\n"++
+ " Corresponding Source in the same way through the same place at no\n"++
+ " further charge. You need not require recipients to copy the\n"++
+ " Corresponding Source along with the object code. If the place to\n"++
+ " copy the object code is a network server, the Corresponding Source\n"++
+ " may be on a different server (operated by you or a third party)\n"++
+ " that supports equivalent copying facilities, provided you maintain\n"++
+ " clear directions next to the object code saying where to find the\n"++
+ " Corresponding Source. Regardless of what server hosts the\n"++
+ " Corresponding Source, you remain obligated to ensure that it is\n"++
+ " available for as long as needed to satisfy these requirements.\n"++
+ "\n"++
+ " e) Convey the object code using peer-to-peer transmission, provided\n"++
+ " you inform other peers where the object code and Corresponding\n"++
+ " Source of the work are being offered to the general public at no\n"++
+ " charge under subsection 6d.\n"++
+ "\n"++
+ " A separable portion of the object code, whose source code is excluded\n"++
+ "from the Corresponding Source as a System Library, need not be\n"++
+ "included in conveying the object code work.\n"++
+ "\n"++
+ " A \"User Product\" is either (1) a \"consumer product\", which means any\n"++
+ "tangible personal property which is normally used for personal, family,\n"++
+ "or household purposes, or (2) anything designed or sold for incorporation\n"++
+ "into a dwelling. In determining whether a product is a consumer product,\n"++
+ "doubtful cases shall be resolved in favor of coverage. For a particular\n"++
+ "product received by a particular user, \"normally used\" refers to a\n"++
+ "typical or common use of that class of product, regardless of the status\n"++
+ "of the particular user or of the way in which the particular user\n"++
+ "actually uses, or expects or is expected to use, the product. A product\n"++
+ "is a consumer product regardless of whether the product has substantial\n"++
+ "commercial, industrial or non-consumer uses, unless such uses represent\n"++
+ "the only significant mode of use of the product.\n"++
+ "\n"++
+ " \"Installation Information\" for a User Product means any methods,\n"++
+ "procedures, authorization keys, or other information required to install\n"++
+ "and execute modified versions of a covered work in that User Product from\n"++
+ "a modified version of its Corresponding Source. The information must\n"++
+ "suffice to ensure that the continued functioning of the modified object\n"++
+ "code is in no case prevented or interfered with solely because\n"++
+ "modification has been made.\n"++
+ "\n"++
+ " If you convey an object code work under this section in, or with, or\n"++
+ "specifically for use in, a User Product, and the conveying occurs as\n"++
+ "part of a transaction in which the right of possession and use of the\n"++
+ "User Product is transferred to the recipient in perpetuity or for a\n"++
+ "fixed term (regardless of how the transaction is characterized), the\n"++
+ "Corresponding Source conveyed under this section must be accompanied\n"++
+ "by the Installation Information. But this requirement does not apply\n"++
+ "if neither you nor any third party retains the ability to install\n"++
+ "modified object code on the User Product (for example, the work has\n"++
+ "been installed in ROM).\n"++
+ "\n"++
+ " The requirement to provide Installation Information does not include a\n"++
+ "requirement to continue to provide support service, warranty, or updates\n"++
+ "for a work that has been modified or installed by the recipient, or for\n"++
+ "the User Product in which it has been modified or installed. Access to a\n"++
+ "network may be denied when the modification itself materially and\n"++
+ "adversely affects the operation of the network or violates the rules and\n"++
+ "protocols for communication across the network.\n"++
+ "\n"++
+ " Corresponding Source conveyed, and Installation Information provided,\n"++
+ "in accord with this section must be in a format that is publicly\n"++
+ "documented (and with an implementation available to the public in\n"++
+ "source code form), and must require no special password or key for\n"++
+ "unpacking, reading or copying.\n"++
+ "\n"++
+ " 7. Additional Terms.\n"++
+ "\n"++
+ " \"Additional permissions\" are terms that supplement the terms of this\n"++
+ "License by making exceptions from one or more of its conditions.\n"++
+ "Additional permissions that are applicable to the entire Program shall\n"++
+ "be treated as though they were included in this License, to the extent\n"++
+ "that they are valid under applicable law. If additional permissions\n"++
+ "apply only to part of the Program, that part may be used separately\n"++
+ "under those permissions, but the entire Program remains governed by\n"++
+ "this License without regard to the additional permissions.\n"++
+ "\n"++
+ " When you convey a copy of a covered work, you may at your option\n"++
+ "remove any additional permissions from that copy, or from any part of\n"++
+ "it. (Additional permissions may be written to require their own\n"++
+ "removal in certain cases when you modify the work.) You may place\n"++
+ "additional permissions on material, added by you to a covered work,\n"++
+ "for which you have or can give appropriate copyright permission.\n"++
+ "\n"++
+ " Notwithstanding any other provision of this License, for material you\n"++
+ "add to a covered work, you may (if authorized by the copyright holders of\n"++
+ "that material) supplement the terms of this License with terms:\n"++
+ "\n"++
+ " a) Disclaiming warranty or limiting liability differently from the\n"++
+ " terms of sections 15 and 16 of this License; or\n"++
+ "\n"++
+ " b) Requiring preservation of specified reasonable legal notices or\n"++
+ " author attributions in that material or in the Appropriate Legal\n"++
+ " Notices displayed by works containing it; or\n"++
+ "\n"++
+ " c) Prohibiting misrepresentation of the origin of that material, or\n"++
+ " requiring that modified versions of such material be marked in\n"++
+ " reasonable ways as different from the original version; or\n"++
+ "\n"++
+ " d) Limiting the use for publicity purposes of names of licensors or\n"++
+ " authors of the material; or\n"++
+ "\n"++
+ " e) Declining to grant rights under trademark law for use of some\n"++
+ " trade names, trademarks, or service marks; or\n"++
+ "\n"++
+ " f) Requiring indemnification of licensors and authors of that\n"++
+ " material by anyone who conveys the material (or modified versions of\n"++
+ " it) with contractual assumptions of liability to the recipient, for\n"++
+ " any liability that these contractual assumptions directly impose on\n"++
+ " those licensors and authors.\n"++
+ "\n"++
+ " All other non-permissive additional terms are considered \"further\n"++
+ "restrictions\" within the meaning of section 10. If the Program as you\n"++
+ "received it, or any part of it, contains a notice stating that it is\n"++
+ "governed by this License along with a term that is a further\n"++
+ "restriction, you may remove that term. If a license document contains\n"++
+ "a further restriction but permits relicensing or conveying under this\n"++
+ "License, you may add to a covered work material governed by the terms\n"++
+ "of that license document, provided that the further restriction does\n"++
+ "not survive such relicensing or conveying.\n"++
+ "\n"++
+ " If you add terms to a covered work in accord with this section, you\n"++
+ "must place, in the relevant source files, a statement of the\n"++
+ "additional terms that apply to those files, or a notice indicating\n"++
+ "where to find the applicable terms.\n"++
+ "\n"++
+ " Additional terms, permissive or non-permissive, may be stated in the\n"++
+ "form of a separately written license, or stated as exceptions;\n"++
+ "the above requirements apply either way.\n"++
+ "\n"++
+ " 8. Termination.\n"++
+ "\n"++
+ " You may not propagate or modify a covered work except as expressly\n"++
+ "provided under this License. Any attempt otherwise to propagate or\n"++
+ "modify it is void, and will automatically terminate your rights under\n"++
+ "this License (including any patent licenses granted under the third\n"++
+ "paragraph of section 11).\n"++
+ "\n"++
+ " However, if you cease all violation of this License, then your\n"++
+ "license from a particular copyright holder is reinstated (a)\n"++
+ "provisionally, unless and until the copyright holder explicitly and\n"++
+ "finally terminates your license, and (b) permanently, if the copyright\n"++
+ "holder fails to notify you of the violation by some reasonable means\n"++
+ "prior to 60 days after the cessation.\n"++
+ "\n"++
+ " Moreover, your license from a particular copyright holder is\n"++
+ "reinstated permanently if the copyright holder notifies you of the\n"++
+ "violation by some reasonable means, this is the first time you have\n"++
+ "received notice of violation of this License (for any work) from that\n"++
+ "copyright holder, and you cure the violation prior to 30 days after\n"++
+ "your receipt of the notice.\n"++
+ "\n"++
+ " Termination of your rights under this section does not terminate the\n"++
+ "licenses of parties who have received copies or rights from you under\n"++
+ "this License. If your rights have been terminated and not permanently\n"++
+ "reinstated, you do not qualify to receive new licenses for the same\n"++
+ "material under section 10.\n"++
+ "\n"++
+ " 9. Acceptance Not Required for Having Copies.\n"++
+ "\n"++
+ " You are not required to accept this License in order to receive or\n"++
+ "run a copy of the Program. Ancillary propagation of a covered work\n"++
+ "occurring solely as a consequence of using peer-to-peer transmission\n"++
+ "to receive a copy likewise does not require acceptance. However,\n"++
+ "nothing other than this License grants you permission to propagate or\n"++
+ "modify any covered work. These actions infringe copyright if you do\n"++
+ "not accept this License. Therefore, by modifying or propagating a\n"++
+ "covered work, you indicate your acceptance of this License to do so.\n"++
+ "\n"++
+ " 10. Automatic Licensing of Downstream Recipients.\n"++
+ "\n"++
+ " Each time you convey a covered work, the recipient automatically\n"++
+ "receives a license from the original licensors, to run, modify and\n"++
+ "propagate that work, subject to this License. You are not responsible\n"++
+ "for enforcing compliance by third parties with this License.\n"++
+ "\n"++
+ " An \"entity transaction\" is a transaction transferring control of an\n"++
+ "organization, or substantially all assets of one, or subdividing an\n"++
+ "organization, or merging organizations. If propagation of a covered\n"++
+ "work results from an entity transaction, each party to that\n"++
+ "transaction who receives a copy of the work also receives whatever\n"++
+ "licenses to the work the party's predecessor in interest had or could\n"++
+ "give under the previous paragraph, plus a right to possession of the\n"++
+ "Corresponding Source of the work from the predecessor in interest, if\n"++
+ "the predecessor has it or can get it with reasonable efforts.\n"++
+ "\n"++
+ " You may not impose any further restrictions on the exercise of the\n"++
+ "rights granted or affirmed under this License. For example, you may\n"++
+ "not impose a license fee, royalty, or other charge for exercise of\n"++
+ "rights granted under this License, and you may not initiate litigation\n"++
+ "(including a cross-claim or counterclaim in a lawsuit) alleging that\n"++
+ "any patent claim is infringed by making, using, selling, offering for\n"++
+ "sale, or importing the Program or any portion of it.\n"++
+ "\n"++
+ " 11. Patents.\n"++
+ "\n"++
+ " A \"contributor\" is a copyright holder who authorizes use under this\n"++
+ "License of the Program or a work on which the Program is based. The\n"++
+ "work thus licensed is called the contributor's \"contributor version\".\n"++
+ "\n"++
+ " A contributor's \"essential patent claims\" are all patent claims\n"++
+ "owned or controlled by the contributor, whether already acquired or\n"++
+ "hereafter acquired, that would be infringed by some manner, permitted\n"++
+ "by this License, of making, using, or selling its contributor version,\n"++
+ "but do not include claims that would be infringed only as a\n"++
+ "consequence of further modification of the contributor version. For\n"++
+ "purposes of this definition, \"control\" includes the right to grant\n"++
+ "patent sublicenses in a manner consistent with the requirements of\n"++
+ "this License.\n"++
+ "\n"++
+ " Each contributor grants you a non-exclusive, worldwide, royalty-free\n"++
+ "patent license under the contributor's essential patent claims, to\n"++
+ "make, use, sell, offer for sale, import and otherwise run, modify and\n"++
+ "propagate the contents of its contributor version.\n"++
+ "\n"++
+ " In the following three paragraphs, a \"patent license\" is any express\n"++
+ "agreement or commitment, however denominated, not to enforce a patent\n"++
+ "(such as an express permission to practice a patent or covenant not to\n"++
+ "sue for patent infringement). To \"grant\" such a patent license to a\n"++
+ "party means to make such an agreement or commitment not to enforce a\n"++
+ "patent against the party.\n"++
+ "\n"++
+ " If you convey a covered work, knowingly relying on a patent license,\n"++
+ "and the Corresponding Source of the work is not available for anyone\n"++
+ "to copy, free of charge and under the terms of this License, through a\n"++
+ "publicly available network server or other readily accessible means,\n"++
+ "then you must either (1) cause the Corresponding Source to be so\n"++
+ "available, or (2) arrange to deprive yourself of the benefit of the\n"++
+ "patent license for this particular work, or (3) arrange, in a manner\n"++
+ "consistent with the requirements of this License, to extend the patent\n"++
+ "license to downstream recipients. \"Knowingly relying\" means you have\n"++
+ "actual knowledge that, but for the patent license, your conveying the\n"++
+ "covered work in a country, or your recipient's use of the covered work\n"++
+ "in a country, would infringe one or more identifiable patents in that\n"++
+ "country that you have reason to believe are valid.\n"++
+ "\n"++
+ " If, pursuant to or in connection with a single transaction or\n"++
+ "arrangement, you convey, or propagate by procuring conveyance of, a\n"++
+ "covered work, and grant a patent license to some of the parties\n"++
+ "receiving the covered work authorizing them to use, propagate, modify\n"++
+ "or convey a specific copy of the covered work, then the patent license\n"++
+ "you grant is automatically extended to all recipients of the covered\n"++
+ "work and works based on it.\n"++
+ "\n"++
+ " A patent license is \"discriminatory\" if it does not include within\n"++
+ "the scope of its coverage, prohibits the exercise of, or is\n"++
+ "conditioned on the non-exercise of one or more of the rights that are\n"++
+ "specifically granted under this License. You may not convey a covered\n"++
+ "work if you are a party to an arrangement with a third party that is\n"++
+ "in the business of distributing software, under which you make payment\n"++
+ "to the third party based on the extent of your activity of conveying\n"++
+ "the work, and under which the third party grants, to any of the\n"++
+ "parties who would receive the covered work from you, a discriminatory\n"++
+ "patent license (a) in connection with copies of the covered work\n"++
+ "conveyed by you (or copies made from those copies), or (b) primarily\n"++
+ "for and in connection with specific products or compilations that\n"++
+ "contain the covered work, unless you entered into that arrangement,\n"++
+ "or that patent license was granted, prior to 28 March 2007.\n"++
+ "\n"++
+ " Nothing in this License shall be construed as excluding or limiting\n"++
+ "any implied license or other defenses to infringement that may\n"++
+ "otherwise be available to you under applicable patent law.\n"++
+ "\n"++
+ " 12. No Surrender of Others' Freedom.\n"++
+ "\n"++
+ " If conditions are imposed on you (whether by court order, agreement or\n"++
+ "otherwise) that contradict the conditions of this License, they do not\n"++
+ "excuse you from the conditions of this License. If you cannot convey a\n"++
+ "covered work so as to satisfy simultaneously your obligations under this\n"++
+ "License and any other pertinent obligations, then as a consequence you may\n"++
+ "not convey it at all. For example, if you agree to terms that obligate you\n"++
+ "to collect a royalty for further conveying from those to whom you convey\n"++
+ "the Program, the only way you could satisfy both those terms and this\n"++
+ "License would be to refrain entirely from conveying the Program.\n"++
+ "\n"++
+ " 13. Use with the GNU Affero General Public License.\n"++
+ "\n"++
+ " Notwithstanding any other provision of this License, you have\n"++
+ "permission to link or combine any covered work with a work licensed\n"++
+ "under version 3 of the GNU Affero General Public License into a single\n"++
+ "combined work, and to convey the resulting work. The terms of this\n"++
+ "License will continue to apply to the part which is the covered work,\n"++
+ "but the special requirements of the GNU Affero General Public License,\n"++
+ "section 13, concerning interaction through a network will apply to the\n"++
+ "combination as such.\n"++
+ "\n"++
+ " 14. Revised Versions of this License.\n"++
+ "\n"++
+ " The Free Software Foundation may publish revised and/or new versions of\n"++
+ "the GNU General Public License from time to time. Such new versions will\n"++
+ "be similar in spirit to the present version, but may differ in detail to\n"++
+ "address new problems or concerns.\n"++
+ "\n"++
+ " Each version is given a distinguishing version number. If the\n"++
+ "Program specifies that a certain numbered version of the GNU General\n"++
+ "Public License \"or any later version\" applies to it, you have the\n"++
+ "option of following the terms and conditions either of that numbered\n"++
+ "version or of any later version published by the Free Software\n"++
+ "Foundation. If the Program does not specify a version number of the\n"++
+ "GNU General Public License, you may choose any version ever published\n"++
+ "by the Free Software Foundation.\n"++
+ "\n"++
+ " If the Program specifies that a proxy can decide which future\n"++
+ "versions of the GNU General Public License can be used, that proxy's\n"++
+ "public statement of acceptance of a version permanently authorizes you\n"++
+ "to choose that version for the Program.\n"++
+ "\n"++
+ " Later license versions may give you additional or different\n"++
+ "permissions. However, no additional obligations are imposed on any\n"++
+ "author or copyright holder as a result of your choosing to follow a\n"++
+ "later version.\n"++
+ "\n"++
+ " 15. Disclaimer of Warranty.\n"++
+ "\n"++
+ " THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY\n"++
+ "APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT\n"++
+ "HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM \"AS IS\" WITHOUT WARRANTY\n"++
+ "OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,\n"++
+ "THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n"++
+ "PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM\n"++
+ "IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF\n"++
+ "ALL NECESSARY SERVICING, REPAIR OR CORRECTION.\n"++
+ "\n"++
+ " 16. Limitation of Liability.\n"++
+ "\n"++
+ " IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING\n"++
+ "WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS\n"++
+ "THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY\n"++
+ "GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE\n"++
+ "USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF\n"++
+ "DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD\n"++
+ "PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),\n"++
+ "EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF\n"++
+ "SUCH DAMAGES.\n"++
+ "\n"++
+ " 17. Interpretation of Sections 15 and 16.\n"++
+ "\n"++
+ " If the disclaimer of warranty and limitation of liability provided\n"++
+ "above cannot be given local legal effect according to their terms,\n"++
+ "reviewing courts shall apply local law that most closely approximates\n"++
+ "an absolute waiver of all civil liability in connection with the\n"++
+ "Program, unless a warranty or assumption of liability accompanies a\n"++
+ "copy of the Program in return for a fee.\n"++
+ "\n"++
+ " END OF TERMS AND CONDITIONS\n"++
+ "\n"++
+ " How to Apply These Terms to Your New Programs\n"++
+ "\n"++
+ " If you develop a new program, and you want it to be of the greatest\n"++
+ "possible use to the public, the best way to achieve this is to make it\n"++
+ "free software which everyone can redistribute and change under these terms.\n"++
+ "\n"++
+ " To do so, attach the following notices to the program. It is safest\n"++
+ "to attach them to the start of each source file to most effectively\n"++
+ "state the exclusion of warranty; and each file should have at least\n"++
+ "the \"copyright\" line and a pointer to where the full notice is found.\n"++
+ "\n"++
+ " \n"++
+ " Copyright (C) \n"++
+ "\n"++
+ " This program is free software: you can redistribute it and/or modify\n"++
+ " it under the terms of the GNU General Public License as published by\n"++
+ " the Free Software Foundation, either version 3 of the License, or\n"++
+ " (at your option) any later version.\n"++
+ "\n"++
+ " This program is distributed in the hope that it will be useful,\n"++
+ " but WITHOUT ANY WARRANTY; without even the implied warranty of\n"++
+ " MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n"++
+ " GNU General Public License for more details.\n"++
+ "\n"++
+ " You should have received a copy of the GNU General Public License\n"++
+ " along with this program. If not, see .\n"++
+ "\n"++
+ "Also add information on how to contact you by electronic and paper mail.\n"++
+ "\n"++
+ " If the program does terminal interaction, make it output a short\n"++
+ "notice like this when it starts in an interactive mode:\n"++
+ "\n"++
+ " Copyright (C) \n"++
+ " This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.\n"++
+ " This is free software, and you are welcome to redistribute it\n"++
+ " under certain conditions; type `show c' for details.\n"++
+ "\n"++
+ "The hypothetical commands `show w' and `show c' should show the appropriate\n"++
+ "parts of the General Public License. Of course, your program's commands\n"++
+ "might be different; for a GUI interface, you would use an \"about box\".\n"++
+ "\n"++
+ " You should also get your employer (if you work as a programmer) or school,\n"++
+ "if any, to sign a \"copyright disclaimer\" for the program, if necessary.\n"++
+ "For more information on this, and how to apply and follow the GNU GPL, see\n"++
+ ".\n"++
+ "\n"++
+ " The GNU General Public License does not permit incorporating your program\n"++
+ "into proprietary programs. If your program is a subroutine library, you\n"++
+ "may consider it more useful to permit linking proprietary applications with\n"++
+ "the library. If this is what you want to do, use the GNU Lesser General\n"++
+ "Public License instead of this License. But first, please read\n"++
+ ".\n"
diff --git a/src/Main.hs b/src/Main.hs
new file mode 100644
index 0000000..1c2d2bc
--- /dev/null
+++ b/src/Main.hs
@@ -0,0 +1,679 @@
+{- | SciDB is a column-oriented database management system (DBMS)
+designed for multidimensional data management and analytics common to
+scientific, geospatial, industrial, and financial applications. See
+ and for
+more information about the Data Management and Analytics Software
+System (DMAS) known as SciDB.
+
+The documenation of 'main' is the manual page for 'hquery', a Haskell
+command line and interactive interpreter for SciDB AFL queries via
+shim. See also
+
+ * 'hquery' @-y@,
+ * 'hquery' @-h@, or
+ * 'hquery' @-m@
+
+for more information
+
+There is a primitive API derived after the creation of 'hquery'
+defined by the following data structures and actions:
+
+ * 'Environment'
+ * 'Err'
+ * 'mkGlobalManagerEnv'
+ * 'runQueries'
+ * 'unsafeRunQuery'
+ * 'getSciDbVersion'
+-}
+
+module Main (main) where
+
+
+-- Section: imports
+import qualified Network.HTTP.Client as HTTP (Request(..))
+
+import Environment (Environment(..),defaultEnv,maybePort,Verbosity(..))
+import ErrM (Err(..))
+import HQuery (hquery,getSciDbVersion,mkGlobalManagerEnv
+ -- Below is added for Haddock documentation
+ ,runQueries,unsafeRunQuery)
+import License (putLicense)
+import Manual (putManual)
+import Utils (dot,wrap,cleanDoubleQuotes,checkMajorVersion,stripUsing)
+import UtilsUnsafe (valid,VALID(..),fetchUsername,fetchPassword
+ ,isConnectable,managerSettings,base64Sha512Hash)
+
+import Control.Exception (try)
+import Control.Monad (unless,when)
+import Data.Char (toLower)
+import Data.List (intercalate)
+import Data.Maybe (fromMaybe,isJust,fromJust)
+import Network.HTTP.Client (HttpException(..))
+import Safe (readMay)
+import System.Console.GetOpt (ArgDescr(..),OptDescr(..),ArgOrder(..),usageInfo,getOpt)
+import System.Directory (getCurrentDirectory)
+import System.Environment (getEnvironment,getProgName,getArgs)
+import System.Exit (exitSuccess,exitWith,ExitCode(..))
+import System.FilePath (takeFileName,pathSeparator)
+import System.IO (stderr,stdout,hPutStrLn,Handle(..))
+
+-- Section: main
+{- |
+The Haskell command line and interactive interpreter manual page
+for 'hquery':
+
+> hquery(1) User Command hquery(1)
+>
+> NAME
+> hquery - Haskell query for SciDB via shim
+>
+> SYNOPSIS
+> hquery [-V n] [-t hstfile] [-c certstore] [-n]
+> [-r http[s]] [-i host] [-p port] [-a true|false]
+> [-e true|false] [-o fmt] [-b num] [-d|-s] [-u usr] [-w pw]
+> [-f qyfile] [query...]
+> hquery -g
+> hquery -h
+> hquery -l
+> hquery -m
+> hquery -v
+> hquery -y
+>
+> AVAILABILITY
+> Marcus D. Gabriel. All rights reserved 2014-19(c).
+>
+> marcus@gabriel.name
+>
+> License terms: GNU GPL version 3 (hquery -l)
+>
+> DESCRIPTION
+> The command hquery with no operands and no options will begin an
+> interacitve session with a SciDB server using SciDB's shim
+> protocol at http://localhost:8080.
+>
+> With operands, each string will be executed as a SciDB AFL (Array
+> Functional Language) query returning a result in SciDB DCSV
+> format and fetching only 23 lines per query by default. If
+> stdin is non-empty, it will be execute before the operands.
+> SciDB AFL queries are case insensitive and terminated by
+> semi-colons (;).
+>
+> Before submitting a query to the shim server, the command
+> hquery will
+> 1. return syntax and parsing errors
+> 2. report bad nestings, e.g., 'uniq(store(A,B));'
+> 3. report unknown commands, ignoring them
+>
+> Additionally, the command hquery reports SciDB/shim server
+> query exceptions without terminating the process.
+>
+> The command hquery accepts Haskell sytle comments and accepts
+> the setting of the following following global variables:
+>
+> -- Number of lines to fetch
+> n=Integer;
+> -- Format of the output
+> format={'csv'|'csv+'|'dcsv'|'dense'|'sparse'|'opaque'
+> |'store'|'text'|'tsv'|'tsv+'};
+> -- True to fetch data, false to not fetch data
+> fetch={true|false};
+> -- True to read lines, false to read bytes
+> readinglines={true|false};
+> -- Prefix to execute before a query by shim, e.g.,
+> prefix='a_query(\'a_string\');'
+>
+> Prefix is an optional, semi-colon separated, AFL statements
+> to precede a query in the same SciDB connection context.
+> It is mainly used for SciDB namespace and role setting.
+> There is no terminating semi-colon so trailing semi-colons
+> are removed otherwise the prefix is sent to shim unverified
+> and unaltered via the variable 'prefix'.
+>
+> The command 'quit;' or 'exit;' ends the interactive session
+> with exit status 0. The command "vars;" displays the interpreter
+> variables and values, and the command "funs;" displays the
+> currently defined interpreter functions and definitions: exit,
+> funs, quit, upload, and vars.
+>
+> The upload command takes one argument, a local file path
+> string, and returns a shim server-side file path. It is used
+> in queries such as load, input, load_module that take a shim
+> server-side file path. Examples are
+>
+> load(m4x4_missing,
+> upload('/home/scidb/scidb/m4x4_missing.scidb'));
+>
+> input(m4x4_missing,
+> upload('/home/scidb/scidb/m4x4_missing.scidb'));
+>
+> load_module(upload('/home/scidb/scidb/module_1.txt'));
+>
+> join(input(m4x4,upload('/tmp/a\\'y\\'b.txt')),
+> input(m4x4,upload('/tmp/z.txt')));
+>
+> All of the above is case insensitive and terminated with a
+> semi-colon (;).
+>
+> INTERACTIVE SESSION
+> Multi-line queries are supported interactively as they
+> are in non-interactive execution. Ctrl-D at a new prompt
+> ends the interactive session. Ctrl-C returns to the
+> interactive prompt, used to end input, especially
+> multi-line input.
+>
+> The default prompt is 'True/dcsv/23?', for example,
+>
+> True/dcsv/23? list('arrays');
+>
+> which displays up to 23 lines of arrays, that is,
+>
+> Fetch/Format/NumberOfLines?
+>
+> You can change the global variables 'n', 'format', 'fetch',
+> 'readinglines', and 'prefix' during execution which changes
+> the prompt:
+>
+> True/dcsv/23? n=200; -- Fetch 200 lines
+> True/dcsv/200? n=0; -- Fetch all lines
+> True/dcsv/0? format='csv'; -- Set format to csv
+> True/csv/0? fetch=false; -- Fetch no lines regardless
+> -- the value of n
+> False/csv/0? fetch=true;format=dcsv;n=23;
+> True/dcsv/23? readinglines=false; -- Fetch all bytes regardless
+> -- the value of n
+> Bytes/dcsv/23? prefix='set_namespace(\'sensor_data\');';
+> Bytes/dcsv/23p list('arrays'); -- List sensor_data arrays
+> Bytes/dcsv/23p quit;
+>
+> In other words, the prompt indicates the default behaviour for
+> the next query executed.
+>
+> OPTIONS
+> The following options are supported:
+>
+> -a True|false, true to read lines, false to read bytes
+> (--reading-lines). If false, the number of lines to
+> fetch (-b) is ignored and the entire output buffer is
+> downloaded. This follows the recommendataion of the
+> shim documentation.
+>
+> -b Number, number of lines to fetch (--number).
+>
+> -c Certificate store file, a certificate store to load and use
+> for SSL/TLS connections (--certificate-store). The insecure
+> option (-n) over-rides the certificate store (-c).
+>
+> -d Use basic digest access authorization, used by either the
+> http and https protocols (--digest-authorization). Digest
+> authorization (-d) over-rides SciDB authorization (-s).
+>
+> -e True|false, true to fetch lines, false to not fetch lines
+> (--fetch).
+>
+> -f Query file, a readable file of queries. Multi-line queries
+> are supported in a file (--file). If stdin is non-empty,
+> it is executed before the file of queries. If operands are
+> present, they are executed after the file of queries.
+>
+> -g Get and display the SciDB version via shim and then exit
+> (--scidb-version). This performs a simple check for shim
+> and SciDB availability.
+>
+> -h Display a short hquery summary (--help).
+>
+> -i IP address or hostname, default localhost (--host).
+>
+> -l Display the hquery license terms (--license).
+>
+> -m Display this internal manual page (--manual).
+>
+> -n Do not use certificate validation, insecure because
+> of potential man-in-the-middle attacks (--insecure).
+> The insecure option (-n) over-rides the certificate
+> store (-c).
+>
+> -o Format, ouput format such as dcsv, csv, csv+, tsv, tsv+,
+> etc (--format).
+>
+> -p Port number, default 8080 for protocol (-r) http and default
+> 8083 for protocol (-r) https (--port).
+>
+> -r Protocol, e.g., http or https, default http (--protocol).
+> If the protocol is http, the certificate store (-c) and
+> insecure (-n) options are disabled.
+>
+> -s Use SciDB access authorization, requires the https protocol
+> (--scidb-authorization). This option sets the https protocol
+> except when digest authorization (-d) over-rides SciDB
+> authorization (-s).
+>
+> -t History file, defualt ~/.hquery_history or /tmp/.hquery_history
+> if ~ does not exist (--history).
+>
+> -u Username, defualt null (--username). Used by the digest or
+> SciDB authorization option (-d or -s). Displays an error
+> and exits if neither is used with digest or SciDB
+> authorization.
+>
+> -v The version of hquery (--version).
+>
+> -w Password, default null (--password). Used by the digest or
+> SciDB authorization option (-d or -s). Displays an error
+> and exits if neither is used with digest or SciDB
+> authorization.
+>
+> -y A synopsis of the internal manual page (--synopsis).
+>
+> -x Prefix, a prefix to execute before a query by shim
+> (--prefix). Note that the prefix on the command line
+> is verified before being sent to shim. Prefix is a
+> semi-colon separated set of statements. It is mainly
+> used for SciDB namespace and role setting. There is no
+> terminating semi-colon so trailing semi-colons are removed.
+>
+> -V Same as -V1 (--verbose).
+> -V0 Quiet. No information is sent to stderr (--verbose=0).
+> -V1 Shows some HTTP exceptions and trace information (--verbose=1).
+> -V2 Shows additional URL information (--verbose=2).
+>
+> OPERANDS
+> SciDB AFL queries.
+>
+> USAGE NOTES
+> The development of the utility hquery began with SciDB community
+> edition 13 and continued with 14, 15, 16, 18, and 19.
+>
+> This version of hquery has been lightly tested with ghc
+> version 8.2.2 and 8.6.5 and SciDB 18.1 and 19.3 community edition.
+> Currently the command hquery has never been tested on a SciDB
+> enterprise > edition, and thus it is not known if SciDB
+> authorization (-s) or prefix (-x) actually works.
+>
+> EXAMPLES
+> To list all currently defined arrays with SciDB authorization required,
+> use
+>
+> hquery -i coordinator -s -u ScidB -w SciDBPassword \
+> "n=0; list('arrays');"
+>
+> To list up to 100 lines of functions with digest authorization required,
+> use
+>
+> hquery -i coordinator -d -u Digest -w DigestPassword \
+> "n=100; list('arrays');"
+>
+> To list up to 23 lines of operators, 23 being the default, use
+>
+> hquery -i coordinator "list('operators');"
+>
+> To list all functions by reading bytes instead of lines, use
+>
+> hquery -i coordinator -a false "list('functions');"
+>
+> To create an array A, use
+>
+> hquery -i coordinator "create array A [i=0:99:0:10];"
+>
+> To execute the file of queries HQTests.qy with no authorization required
+> via a TLS connection, use
+>
+> hquery -c ssl_cert.pem -r https -i coordinator -f HQTest.qy
+>
+> To execute the file of queries HQTests.qy with digest authorization
+> required via a TLS connection insecurely, use
+>
+> hquery -n -r https -i coordinator -d -u Digest -w DigestPassword \
+> -f HQTests.qy
+>
+> To list all arrays in the sensor_data namespace, use
+>
+> hquery -i coordinator -b 0 -x "set_namespace('sensor_data');" \
+> "list('arrays');"
+>
+> To display a synopsis of this internal manual page, use
+>
+> hquery -y
+>
+> To display a summary of usage, use
+>
+> hquery -h
+>
+> To display this internal manual page, use
+>
+> hquery -m
+>
+> ENVIRONMENT VARIABLES
+> HOME Home directory for the history file, by defualt
+> ~/.hquery_history.
+>
+> PAGER Page the internal manual page or license terms
+> using "${PAGER}", otherwise print it.
+>
+> EXIT STATUS
+> An exit status of 0 is returned if successful, otherwise non-zero
+> is returned.
+>
+> EXIT CODE MEANING
+> 1 Unknown error.
+> 2 No authorization specified (-s|-d) with username/password.
+> 3 Invalid protocol, hostname, port, or history file option.
+> 4 Cannot connect to hostname:port.
+> 5 Unreadable query file.
+> 6 Unreadable certicate store file.
+> 7 Invalid certificate store.
+> 8 Network/certificate manager initialization error.
+> 9 Empty, bad or no digest authentication.
+> 10 Unauthorized access.
+> 11 Could not connect to SciDB.
+> 12 Input syntax error for a SciDB query.
+> 13 Fetch (-e) or reading-lines (-a) not true or false.
+> 14 Bad command-line prefix (-x).
+> 15..255 Unknown error.
+>
+> FILES
+> ~/.hquery_history
+>
+> SEE ALSO
+> SciDB, SciDB iquery, SciDB shim at https://www.paradigm4.com/
+> and https://www.paradigm4.com/forum for more information.
+>
+> NOTES
+> Please send bug reports to marcus@gabriel.name.
+>
+> BUGS
+> No known bugs to date.
+-}
+main :: IO ()
+main =
+ do cmdLine <- getArgs
+ progName <- getProgName
+ case getOpt (argOrder config) options cmdLine of
+ (opts, args, []) -> runCmd $ foldl updateEnvField env opts
+ where env = defaultEnv{command=takeFileName progName,operands=args}
+ (_, _, errs) -> error $ concat errs ++ usageInfo (header progName) options
+
+
+-- Section: summary, help, version
+{- |
+Given the programe name, returns the program name and the release
+version.
+-}
+versionHeader :: String -> String
+versionHeader progName = takeFileName progName ++ " release " ++ release config
+
+{- |
+Given the program name, returns a synopis of options.
+-}
+header :: String -> String
+header progName = versionHeader (takeFileName progName) ++
+ "\nUsage: " ++ takeFileName progName ++ flagsOps config
+
+{- |
+Puts the program name and its version.
+-}
+putVersion :: IO ()
+putVersion = do progName <- getProgName
+ putStrLn (versionHeader progName)
+ exitSuccess
+
+{- |
+Puts the program name and the synopsis of options to handle (stdout or
+stderr) with the supplied the exit code.
+-}
+putSynopsis :: Handle -> String -> ExitCode -> IO ()
+putSynopsis h s e = do progName <- getProgName
+ hPutStrLn h (takeFileName progName ++ ": " ++ s ++ header progName)
+ exitWith e
+
+{- |
+Puts the program name and a short summary.
+-}
+putSummary :: IO ()
+putSummary = do progName <- getProgName
+ putStrLn (usageInfo (header progName) options)
+ exitSuccess
+
+
+-- Section: configuration
+{- |
+Configuration information is initial, constant information, that is,
+not needing updates.
+-}
+data Configuration =
+ Config {
+ argOrder :: ArgOrder Flag,
+ release :: String,
+ flagsOps :: String
+ }
+
+{- |
+To be configured once with the versions number and synopsis. Other
+items may of course be added to the configuration as needed.
+-}
+config :: Configuration
+config =
+ Config {
+ argOrder = RequireOrder,
+ -- Update revision number: toggle case
+ release = "2.8.0.429",
+ flagsOps = " [[-g|-h|-l|-m|-v|-y] |"++
+ "\n [-V n] [-t hstfile] [-c certstore] [-n]"++
+ "\n [-r http[s]] [-i host] [-p port] [-a true|false]"++
+ "\n [-e true|false] [-o fmt] [-b num] [-d|-s] [-u usr] [-w pw]"++
+ "\n [-f qyfile] [query...]"++
+ "\n ]"
+ }
+ where
+ revision =
+ let num = flip elem ['0'..'9']
+ in reverse.dropWhile (not.num).reverse.dropWhile (not.num)
+
+
+-- Section: options
+{- |
+Flags set as a function of the command line options supplied.
+-}
+data Flag = Help | License | Manual | Synopsis | Version | Verbose Verbosity
+ | Host String | Port String | Protocol String | File FilePath
+ | History String | Username String | Password String
+ | Fetch String | Format String | Number String | VersionSciDb
+ | DigestAuth | SciDbAuth | CertStore String | Insecure
+ | ReadingLines String | Prefix String
+
+{- |
+Options that can be given on the command line.
+-}
+options :: [OptDescr Flag]
+options =
+ [ Option "a" ["reading-lines"](ReqArg ReadingLines "TRUE|FALSE") "Reading lines: true lines or false bytes."
+ , Option "b" ["number"] (ReqArg Number "NUMBER") "Number of lines to fetch when possible."
+ , Option "c" ["certificate-store"] (ReqArg CertStore "CERTSTORE") "Load and use certificate store."
+ , Option "d" ["digest-authorization"] (NoArg DigestAuth) "Use basic digest authorization."
+ , Option "e" ["fetch"] (ReqArg Fetch "TRUE|FALSE") "Fetch lines: true or false."
+ , Option "f" ["file"] (ReqArg File "FILE") "File of queries FILE."
+ , Option "g" ["scidb-version"] (NoArg VersionSciDb) "Get and display the SciDB version via shim."
+ , Option "h" ["help"] (NoArg Help) "Help summary."
+ , Option "i" ["host"] (ReqArg Host "HOSTNAME") "Hostname or IP address HOSTNAME."
+ , Option "l" ["license"] (NoArg License) "License terms."
+ , Option "m" ["manual"] (NoArg Manual) "Manual page."
+ , Option "n" ["insecure"] (NoArg Insecure) "Do not use certificate validation (\"insecure\")."
+ , Option "o" ["format"] (ReqArg Format "FORMAT") "Format dcsv, csv, csv+, tsv, tsv+, etc."
+ , Option "p" ["port"] (ReqArg Port "PORT") "Port number PORT."
+ , Option "r" ["protocol"] (ReqArg Protocol "PROTOCOL") "Protocol HTTP or HTTPS."
+ , Option "s" ["scidb-authorization"] (NoArg SciDbAuth) "Use SciDB authorization."
+ , Option "t" ["history"] (ReqArg History "HISTORY") "History file HISTORY."
+ , Option "u" ["username"] (ReqArg Username "USERNAME") "Username USERNAME."
+ , Option "v" ["version"] (NoArg Version) "Version of this command."
+ , Option "w" ["password"] (ReqArg Password "PASSWORD") "Password PASWORD."
+ , Option "y" ["synopsis"] (NoArg Synopsis) "Help synopsis."
+ , Option "x" ["prefix"] (ReqArg Prefix "PREFIX") "Prefix to execute before a query by shim."
+ , Option "V" ["verbose"] (OptArg inpver "012") "Verbose information to stderr."
+ ]
+ where inpver :: Maybe String -> Flag
+ inpver ms = Verbose $ case (fromMaybe (-1) . readMay . fromMaybe "1") ms of
+ 0 -> Verbose0
+ 1 -> Verbose1
+ 2 -> Verbose2
+ _ -> VerboseDef
+
+-- Section: updating a field in the environment
+{- |
+Every option, and only an option, must be able to be updated here.
+-}
+updateEnvField :: Environment -> Flag -> Environment
+updateEnvField env opt =
+ case opt of
+ Host s -> env{host = s}
+ Port s -> env{port = Just s}
+ Protocol s -> env{protocol = s}
+ CertStore s-> env{certStore = s}
+ Insecure -> env{insecure = True}
+ DigestAuth -> env{digestAuth= True}
+ SciDbAuth -> env{scidbAuth = True}
+ Fetch s -> env{defFetch = tOrF s}
+ ReadingLines s->env{defReadingLines=tOrF s}
+ Prefix s -> env{defPrefix =xsemi s}
+ Format s -> env{defFormat = s}
+ Number s -> env{defNumber = s}
+ Username s -> env{username = s}
+ Password s -> env{password = s}
+ History s -> env{history = s}
+ File s -> env{file = s}
+ Help -> env{help = True}
+ License -> env{license = True}
+ Manual -> env{manual = True}
+ Synopsis -> env{synopsis = True}
+ Version -> env{version = True}
+ VersionSciDb->env{versionSciDb= True}
+ Verbose v -> env{verbose = v}
+ where tOrF s = case fmap toLower s of
+ "true" -> Just True
+ "false" -> Just False
+ _ -> Nothing
+ xsemi = stripUsing (==';')
+-- _ -> error (command env ++ ": updateEnvField: unknown error")
+
+-- Section: running the command given the environment
+{- |
+Update the environment with updateEnv, verify the environment with
+verifyEnv, resolve option conflicts with resolveEnv, and run the
+command given the environemnt with runWith which does the actual work,
+usually imported from a module.
+-}
+runCmd :: Environment -> IO ()
+runCmd env
+ | synopsis env = putSynopsis stdout "\r" ExitSuccess
+ | help env = putSummary
+ | version env = putVersion
+ | manual env = putManual
+ | license env = putLicense
+ | otherwise =
+ do env' <- fmap resolveEnv (updateEnv0 env)
+ verifyEnv0 env'
+ env'' <- updateEnv1 env'
+ verifyEnv1 env''
+ when (versionSciDb env'') (putStrLn ("SciDB version "++sciDbVersion env'') >> exitSuccess)
+ runWith env''
+
+{- |
+'updateEnv' updates the environment ('Environment') from the universe,
+the external environment.
+-}
+updateEnv0, updateEnv1 :: Environment -> IO Environment
+-- Usage order is important in runCmd, so please do not change it without study
+updateEnv0 env= do let b_ = digestAuth env || scidbAuth env
+ when ((not.null.username) env || (not.null.password) env) $
+ unless b_ (putSynopsis stderr
+ "\rNo authorization (-s|-d) specified with a username/password.\n"
+ (ExitFailure 2)
+ )
+ cd <- getCurrentDirectory
+ es <- getEnvironment
+ let pd = lookup "PWD" es
+ let hm = lookup "HOME" es
+ let e1 = maybe env{pwd = cd} (\pd -> env{pwd = pd}) pd
+ let e2 = maybe e1 (\hm -> e1{home = hm}) hm
+ return e2
+
+updateEnv1 env =
+ do env' <- try (updateEnv1' env) :: IO (Either HttpException Environment)
+ case env' of
+ Left e -> do case e of
+ HttpExceptionRequest _ ct -> putSynopsis stderr ("\r"++mk show ct++"\n") (ExitFailure 8)
+ InvalidUrlException s1 s2 -> putSynopsis stderr ("\r"++mk id ("Invalid URL: "++s1++": "++s2++"\n")) (ExitFailure 8)
+ undefined -- this point is never reached
+ Right env'' -> fetchUsernamePassword env''
+ where
+ mk f s = intercalate "\n" $ wrap 80 $ cleanDoubleQuotes $ f s
+ updateEnv1' env = do menv <- mkGlobalManagerEnv env
+ maybe (do hPutStrLn stderr ("Invalid certificate store: " ++ certStore env)
+ putSynopsis stderr "\r" (ExitFailure 7)
+ undefined
+ ) return menv
+
+{- | Given the 'Environment' from the command line, fetch from the user
+the username and/or password interactively when required.
+-}
+fetchUsernamePassword :: Environment -> IO Environment
+fetchUsernamePassword e = if digestAuth e || scidbAuth e
+ then do un <- fetch username (fetchUsername "")
+ pw <- encode <$> fetch password (fetchPassword Nothing "")
+ return e{username = un, password = pw}
+ else return e
+ where fetch f g = if null (f e) then g else return (f e)
+ encode = if scidbAuth e && checkMajorVersion (18>=) (sciDbVersion e)
+ then base64Sha512Hash else id
+
+{- |
+'verifyEnv' verifies the environment created from the command line
+options and the supplied operands.
+-}
+verifyEnv0, verifyEnv1 :: Environment -> IO ()
+verifyEnv0 env = do b0 <- valid HOSTNAME (host env)
+ b1 <- valid PORT (maybePort env)
+ b2 <- valid PROTOCOL (protocol env)
+ b3 <- valid HISTORY (history env)
+ unless (b0 && b1 && b2 && b3) (putSynopsis stderr "\r" (ExitFailure 3))
+ b4 <- isConnectable (host env) (maybePort env)
+ unless b4 (putSynopsis stderr "\r" (ExitFailure 4))
+ b5 <- if null (file env) then return True else valid READABLE (file env)
+ unless b5 (putSynopsis stderr "\r" (ExitFailure 5))
+ b6 <-if null (certStore env) then return True else valid READABLE (certStore env)
+ unless b6 (putSynopsis stderr "\r" (ExitFailure 6))
+ let b_ = isJust (defFetch env) && isJust (defReadingLines env)
+ unless b_ (putSynopsis stderr "\r" (ExitFailure 13))
+ b' <- valid PREFIX (defPrefix env)
+ unless b' (putSynopsis stderr "\r" (ExitFailure 14))
+
+verifyEnv1 env =
+ do let b7 = (not . null) (digestHeaders env)
+ when (digestAuth env) $
+ unless b7 (putSynopsis stderr
+ "\rEmpty, bad or no digest authentication\n"
+ (ExitFailure 9)
+ )
+
+{- |
+'resolveEnv' resolves the environment created from the command line
+options and the supplied operands, e.g., if an option over-rides
+another, 'resolveEnv' takes this into account.
+-}
+resolveEnv :: Environment -> Environment
+resolveEnv = resolveEnv5.resolveEnv4.resolveEnv3.resolveEnv2.resolveEnv1.resolveEnv0
+ -- Order is important, so please do not change it without study
+ where
+ resolveEnv0 env = if digestAuth env then env{scidbAuth=False} else env
+ resolveEnv1 env = if digestAuth env || scidbAuth env
+ then env else env{username = "", password = ""}
+ resolveEnv2 env = if scidbAuth env then env{protocol="https"} else env
+ resolveEnv3 env = if insecure env then env{certStore = ""} else env
+ resolveEnv4 env = if protocol env == "http" then env{certStore = "",insecure=False} else env
+ resolveEnv5 env = if history env == "" then env{history = history_file env} else env
+ where history_file env = home env ++ [pathSeparator] ++ dot ++ command env ++ "_history"
+
+{- |
+'runWith' this environment. 'runWith' is the interface between the command
+line options plus operands and the real work. 'runWith' is 'hquery'.
+-}
+runWith :: Environment -> IO ()
+runWith = hquery
diff --git a/src/Manual.hs b/src/Manual.hs
new file mode 100644
index 0000000..f67e8bd
--- /dev/null
+++ b/src/Manual.hs
@@ -0,0 +1,335 @@
+module Manual(putManual) where
+
+import System.Exit (exitWith)
+import UtilsUnsafe (putOrPageStrLn)
+
+-- | Display the internal manual.
+
+putManual :: IO ()
+putManual = putOrPageStrLn internalManual >>= exitWith
+
+-- | Internal manual. The definitive source of the internal manual is
+-- the description section of the module Main.
+
+internalManual :: String
+internalManual =
+ "hquery(1) User Command hquery(1)\n"++
+ "\n"++
+ "NAME\n"++
+ " hquery - Haskell query for SciDB via shim\n"++
+ "\n"++
+ "SYNOPSIS\n"++
+ " hquery [-V n] [-t hstfile] [-c certstore] [-n]\n"++
+ " [-r http[s]] [-i host] [-p port] [-a true|false]\n"++
+ " [-e true|false] [-o fmt] [-b num] [-d|-s] [-u usr] [-w pw]\n"++
+ " [-f qyfile] [query...]\n"++
+ " hquery -g\n"++
+ " hquery -h\n"++
+ " hquery -l\n"++
+ " hquery -m\n"++
+ " hquery -v\n"++
+ " hquery -y\n"++
+ "\n"++
+ "AVAILABILITY\n"++
+ " Marcus D. Gabriel. All rights reserved 2014-19(c).\n"++
+ "\n"++
+ " marcus@gabriel.name\n"++
+ "\n"++
+ " License terms: GNU GPL version 3 (hquery -l)\n"++
+ "\n"++
+ "DESCRIPTION\n"++
+ " The command hquery with no operands and no options will begin an\n"++
+ " interacitve session with a SciDB server using SciDB's shim\n"++
+ " protocol at http://localhost:8080.\n"++
+ "\n"++
+ " With operands, each string will be executed as a SciDB AFL (Array\n"++
+ " Functional Language) query returning a result in SciDB DCSV\n"++
+ " format and fetching only 23 lines per query by default. If\n"++
+ " stdin is non-empty, it will be execute before the operands.\n"++
+ " SciDB AFL queries are case insensitive and terminated by\n"++
+ " semi-colons (;).\n"++
+ "\n"++
+ " Before submitting a query to the shim server, the command\n"++
+ " hquery will\n"++
+ " 1. return syntax and parsing errors\n"++
+ " 2. report bad nestings, e.g., 'uniq(store(A,B));'\n"++
+ " 3. report unknown commands, ignoring them\n"++
+ "\n"++
+ " Additionally, the command hquery reports SciDB/shim server\n"++
+ " query exceptions without terminating the process.\n"++
+ "\n"++
+ " The command hquery accepts Haskell sytle comments and accepts\n"++
+ " the setting of the following following global variables:\n"++
+ "\n"++
+ " -- Number of lines to fetch\n"++
+ " n=Integer;\n"++
+ " -- Format of the output\n"++
+ " format={'csv'|'csv+'|'dcsv'|'dense'|'sparse'|'opaque'\n"++
+ " |'store'|'text'|'tsv'|'tsv+'};\n"++
+ " -- True to fetch data, false to not fetch data\n"++
+ " fetch={true|false};\n"++
+ " -- True to read lines, false to read bytes\n"++
+ " readinglines={true|false};\n"++
+ " -- Prefix to execute before a query by shim, e.g.,\n"++
+ " prefix='a_query(\\'a_string\\');'\n"++
+ "\n"++
+ " Prefix is an optional, semi-colon separated, AFL statements\n"++
+ " to precede a query in the same SciDB connection context.\n"++
+ " It is mainly used for SciDB namespace and role setting.\n"++
+ " There is no terminating semi-colon so trailing semi-colons\n"++
+ " are removed otherwise the prefix is sent to shim unverified\n"++
+ " and unaltered via the variable 'prefix'.\n"++
+ "\n"++
+ " The command 'quit;' or 'exit;' ends the interactive session\n"++
+ " with exit status 0. The command \"vars;\" displays the interpreter\n"++
+ " variables and values, and the command \"funs;\" displays the\n"++
+ " currently defined interpreter functions and definitions: exit,\n"++
+ " funs, quit, upload, and vars.\n"++
+ "\n"++
+ " The upload command takes one argument, a local file path\n"++
+ " string, and returns a shim server-side file path. It is used\n"++
+ " in queries such as load, input, load_module that take a shim\n"++
+ " server-side file path. Examples are\n"++
+ "\n"++
+ " load(m4x4_missing,\n"++
+ " upload('/home/scidb/scidb/m4x4_missing.scidb'));\n"++
+ "\n"++
+ " input(m4x4_missing,\n"++
+ " upload('/home/scidb/scidb/m4x4_missing.scidb'));\n"++
+ "\n"++
+ " load_module(upload('/home/scidb/scidb/module_1.txt'));\n"++
+ "\n"++
+ " join(input(m4x4,upload('/tmp/a\\\\'y\\\\'b.txt')),\n"++
+ " input(m4x4,upload('/tmp/z.txt')));\n"++
+ "\n"++
+ " All of the above is case insensitive and terminated with a\n"++
+ " semi-colon (;).\n"++
+ "\n"++
+ "INTERACTIVE SESSION\n"++
+ " Multi-line queries are supported interactively as they\n"++
+ " are in non-interactive execution. Ctrl-D at a new prompt\n"++
+ " ends the interactive session. Ctrl-C returns to the\n"++
+ " interactive prompt, used to end input, especially\n"++
+ " multi-line input.\n"++
+ "\n"++
+ " The default prompt is 'True/dcsv/23?', for example,\n"++
+ "\n"++
+ " True/dcsv/23? list('arrays');\n"++
+ "\n"++
+ " which displays up to 23 lines of arrays, that is,\n"++
+ "\n"++
+ " Fetch/Format/NumberOfLines?\n"++
+ "\n"++
+ " You can change the global variables 'n', 'format', 'fetch',\n"++
+ " 'readinglines', and 'prefix' during execution which changes\n"++
+ " the prompt:\n"++
+ "\n"++
+ " True/dcsv/23? n=200; -- Fetch 200 lines\n"++
+ " True/dcsv/200? n=0; -- Fetch all lines\n"++
+ " True/dcsv/0? format='csv'; -- Set format to csv\n"++
+ " True/csv/0? fetch=false; -- Fetch no lines regardless\n"++
+ " -- the value of n\n"++
+ " False/csv/0? fetch=true;format=dcsv;n=23;\n"++
+ " True/dcsv/23? readinglines=false; -- Fetch all bytes regardless\n"++
+ " -- the value of n\n"++
+ " Bytes/dcsv/23? prefix='set_namespace(\\'sensor_data\\');';\n"++
+ " Bytes/dcsv/23p list('arrays'); -- List sensor_data arrays\n"++
+ " Bytes/dcsv/23p quit;\n"++
+ "\n"++
+ " In other words, the prompt indicates the default behaviour for\n"++
+ " the next query executed.\n"++
+ "\n"++
+ "OPTIONS\n"++
+ " The following options are supported:\n"++
+ "\n"++
+ " -a True|false, true to read lines, false to read bytes\n"++
+ " (--reading-lines). If false, the number of lines to\n"++
+ " fetch (-b) is ignored and the entire output buffer is\n"++
+ " downloaded. This follows the recommendataion of the\n"++
+ " shim documentation.\n"++
+ "\n"++
+ " -b Number, number of lines to fetch (--number).\n"++
+ "\n"++
+ " -c Certificate store file, a certificate store to load and use\n"++
+ " for SSL/TLS connections (--certificate-store). The insecure\n"++
+ " option (-n) over-rides the certificate store (-c).\n"++
+ "\n"++
+ " -d Use basic digest access authorization, used by either the\n"++
+ " http and https protocols (--digest-authorization). Digest\n"++
+ " authorization (-d) over-rides SciDB authorization (-s).\n"++
+ "\n"++
+ " -e True|false, true to fetch lines, false to not fetch lines\n"++
+ " (--fetch).\n"++
+ "\n"++
+ " -f Query file, a readable file of queries. Multi-line queries\n"++
+ " are supported in a file (--file). If stdin is non-empty,\n"++
+ " it is executed before the file of queries. If operands are\n"++
+ " present, they are executed after the file of queries.\n"++
+ "\n"++
+ " -g Get and display the SciDB version via shim and then exit\n"++
+ " (--scidb-version). This performs a simple check for shim \n"++
+ " and SciDB availability.\n"++
+ "\n"++
+ " -h Display a short hquery summary (--help).\n"++
+ "\n"++
+ " -i IP address or hostname, default localhost (--host).\n"++
+ "\n"++
+ " -l Display the hquery license terms (--license).\n"++
+ "\n"++
+ " -m Display this internal manual page (--manual).\n"++
+ "\n"++
+ " -n Do not use certificate validation, insecure because\n"++
+ " of potential man-in-the-middle attacks (--insecure).\n"++
+ " The insecure option (-n) over-rides the certificate\n"++
+ " store (-c).\n"++
+ "\n"++
+ " -o Format, ouput format such as dcsv, csv, csv+, tsv, tsv+,\n"++
+ " etc (--format).\n"++
+ "\n"++
+ " -p Port number, default 8080 for protocol (-r) http and default\n"++
+ " 8083 for protocol (-r) https (--port).\n"++
+ "\n"++
+ " -r Protocol, e.g., http or https, default http (--protocol).\n"++
+ " If the protocol is http, the certificate store (-c) and\n"++
+ " insecure (-n) options are disabled.\n"++
+ "\n"++
+ " -s Use SciDB access authorization, requires the https protocol\n"++
+ " (--scidb-authorization). This option sets the https protocol\n"++
+ " except when digest authorization (-d) over-rides SciDB\n"++
+ " authorization (-s).\n"++
+ "\n"++
+ " -t History file, defualt ~/.hquery_history or /tmp/.hquery_history\n"++
+ " if ~ does not exist (--history).\n"++
+ "\n"++
+ " -u Username, defualt null (--username). Used by the digest or\n"++
+ " SciDB authorization option (-d or -s). Displays an error\n"++
+ " and exits if neither is used with digest or SciDB\n"++
+ " authorization.\n"++
+ "\n"++
+ " -v The version of hquery (--version).\n"++
+ "\n"++
+ " -w Password, default null (--password). Used by the digest or\n"++
+ " SciDB authorization option (-d or -s). Displays an error\n"++
+ " and exits if neither is used with digest or SciDB\n"++
+ " authorization.\n"++
+ "\n"++
+ " -y A synopsis of the internal manual page (--synopsis).\n"++
+ "\n"++
+ " -x Prefix, a prefix to execute before a query by shim\n"++
+ " (--prefix). Note that the prefix on the command line\n"++
+ " is verified before being sent to shim. Prefix is a\n"++
+ " semi-colon separated set of statements. It is mainly\n"++
+ " used for SciDB namespace and role setting. There is no\n"++
+ " terminating semi-colon so trailing semi-colons are removed.\n"++
+ "\n"++
+ " -V Same as -V1 (--verbose).\n"++
+ " -V0 Quiet. No information is sent to stderr (--verbose=0).\n"++
+ " -V1 Shows some HTTP exceptions and trace information (--verbose=1).\n"++
+ " -V2 Shows additional URL information (--verbose=2).\n"++
+ "\n"++
+ "OPERANDS\n"++
+ " SciDB AFL queries.\n"++
+ "\n"++
+ "USAGE NOTES\n"++
+ " The development of the utility hquery began with SciDB community\n"++
+ " edition 13 and continued with 14, 15, 16, 18, and 19.\n"++
+ "\n"++
+ " This version of hquery has been lightly tested with ghc\n"++
+ " version 8.2.2 and 8.6.5 and SciDB 18.1 and 19.3 community edition.\n"++
+ " Currently the command hquery has never been tested on a SciDB\n"++
+ " enterprise edition, and thus it is not known if SciDB\n"++
+ " authorization (-s) or prefix (-x) actually works.\n"++
+ "\n"++
+ "EXAMPLES\n"++
+ " To list all currently defined arrays with SciDB authorization required,\n"++
+ " use\n"++
+ "\n"++
+ " hquery -i coordinator -s -u ScidB -w SciDBPassword \\\n"++
+ " \"n=0; list('arrays');\"\n"++
+ "\n"++
+ " To list up to 100 lines of functions with digest authorization required,\n"++
+ " use\n"++
+ "\n"++
+ " hquery -i coordinator -d -u Digest -w DigestPassword \\\n"++
+ " \"n=100; list('arrays');\"\n"++
+ "\n"++
+ " To list up to 23 lines of operators, 23 being the default, use\n"++
+ "\n"++
+ " hquery -i coordinator \"list('operators');\"\n"++
+ "\n"++
+ " To list all functions by reading bytes instead of lines, use\n"++
+ "\n"++
+ " hquery -i coordinator -a false \"list('functions');\"\n"++
+ "\n"++
+ " To create an array A, use\n"++
+ "\n"++
+ " hquery -i coordinator \"create array A [i=0:99:0:10];\"\n"++
+ "\n"++
+ " To execute the file of queries HQTests.qy with no authorization required\n"++
+ " via a TLS connection, use\n"++
+ "\n"++
+ " hquery -c ssl_cert.pem -r https -i coordinator -f HQTest.qy\n"++
+ "\n"++
+ " To execute the file of queries HQTests.qy with digest authorization\n"++
+ " required via a TLS connection insecurely, use\n"++
+ "\n"++
+ " hquery -n -r https -i coordinator -d -u Digest -w DigestPassword \\\n"++
+ " -f HQTests.qy\n"++
+ "\n"++
+ " To list all arrays in the sensor_data namespace, use\n"++
+ "\n"++
+ " hquery -i coordinator -b 0 -x \"set_namespace('sensor_data');\" \\\n"++
+ " \"list('arrays');\"\n"++
+ "\n"++
+ " To display a synopsis of this internal manual page, use\n"++
+ "\n"++
+ " hquery -y\n"++
+ "\n"++
+ " To display a summary of usage, use\n"++
+ "\n"++
+ " hquery -h\n"++
+ "\n"++
+ " To display this internal manual page, use\n"++
+ "\n"++
+ " hquery -m\n"++
+ "\n"++
+ "ENVIRONMENT VARIABLES\n"++
+ " HOME Home directory for the history file, by defualt\n"++
+ " ~/.hquery_history.\n"++
+ "\n"++
+ " PAGER Page the internal manual page or license terms\n"++
+ " using \"${PAGER}\", otherwise print it.\n"++
+ "\n"++
+ "EXIT STATUS\n"++
+ " An exit status of 0 is returned if successful, otherwise non-zero\n"++
+ " is returned.\n"++
+ "\n"++
+ " EXIT CODE MEANING\n"++
+ " 1 Unknown error.\n"++
+ " 2 No authorization specified (-s|-d) with username/password.\n"++
+ " 3 Invalid protocol, hostname, port, or history file option.\n"++
+ " 4 Cannot connect to hostname:port.\n"++
+ " 5 Unreadable query file.\n"++
+ " 6 Unreadable certicate store file.\n"++
+ " 7 Invalid certificate store.\n"++
+ " 8 Network/certificate manager initialization error.\n"++
+ " 9 Empty, bad or no digest authentication.\n"++
+ " 10 Unauthorized access.\n"++
+ " 11 Could not connect to SciDB.\n"++
+ " 12 Input syntax error for a SciDB query.\n"++
+ " 13 Fetch (-e) or reading-lines (-a) not true or false.\n"++
+ " 14 Bad command-line prefix (-x).\n"++
+ " 15..255 Unknown error.\n"++
+ "\n"++
+ "FILES\n"++
+ " ~/.hquery_history\n"++
+ "\n"++
+ "SEE ALSO\n"++
+ " SciDB, SciDB iquery, SciDB shim at https://www.paradigm4.com/ \n"++
+ " and https://www.paradigm4.com/forum for more information.\n"++
+ "\n"++
+ "NOTES\n"++
+ " Please send bug reports to marcus@gabriel.name.\n"++
+ "\n"++
+ "BUGS\n"++
+ " No known bugs to date.\n"
diff --git a/src/SciDbAFL.cf b/src/SciDbAFL.cf
new file mode 100644
index 0000000..22abee0
--- /dev/null
+++ b/src/SciDbAFL.cf
@@ -0,0 +1,120 @@
+-- SciDB AFL queries
+
+entrypoints AFL ;
+
+comment "--" ;
+comment "{-" "-}" ;
+
+-- SciDB reserves certain keywords that you cannot use as identifiers
+-- (such as array names, dimension names, or attribute names). The
+-- lists are language-dependent.
+--
+-- The following words are reserved when using AFL:
+-- and array as
+-- asc between case
+-- compression create default
+-- desc else empty
+-- end false if
+-- is not null
+-- or reserve temp
+-- then true using
+-- when
+token ResAnd ["Aa"]["Nn"]["Dd"] ;
+token ResArray ["Aa"]["Rr"]["Rr"]["Aa"]["Yy"] ;
+token ResAs ["Aa"]["Ss"] ;
+token ResAsc ["Aa"]["Ss"]["Cc"] ;
+--ken ResBetween ["Bb"]["Ee"]["Tt"]["Ww"]["Ee"]["Ee"]["Nn"] ; -- Not used here
+--ken ResCase ["Cc"]["Aa"]["Ss"]["Ee"] ; -- Not used here
+token ResCompression ["Cc"]["Oo"]["Mm"]["Pp"]["Rr"]["Ee"]["Ss"]["Ss"]["Ii"]["Oo"]["Nn"] ;
+token ResCreate ["Cc"]["Rr"]["Ee"]["Aa"]["Tt"]["Ee"] ;
+token ResDefault ["Dd"]["Ee"]["Ff"]["Aa"]["Uu"]["Ll"]["Tt"] ;
+token ResDesc ["Dd"]["Ee"]["Ss"]["Cc"] ;
+--ken ResElse ["Ee"]["Ll"]["Ss"]["Ee"] ; -- Not used here
+--ken ResEmpty ["Ee"]["Mm"]["Pp"]["Tt"]["Yy"] ; -- Not used here
+--ken ResEnd ["Ee"]["Nn"]["Dd"] ; -- Not used here
+token ResFalse ["Ff"]["Aa"]["Ll"]["Ss"]["Ee"] ;
+--ken ResIf ["Ii"]["Ff"] ; -- Not used here
+--ken ResIs ["Ii"]["Ss"] ; -- Not used here
+token ResNot ["Nn"]["Oo"]["Tt"] ;
+token ResNull ["Nn"]["Uu"]["Ll"]["Ll"] ;
+token ResOr ["Oo"]["Rr"] ;
+--ken ResReserve ["Rr"]["Ee"]["Ss"]["Ee"]["Rr"]["Vv"]["Ee"] ; -- Not used here
+token ResTemp ["Tt"]["Ee"]["Mm"]["Pp"] ;
+--ken ResThen ["Tt"]["Hh"]["Ee"]["Nn"] ; -- Not used here
+token ResTrue ["Tt"]["Rr"]["Uu"]["Ee"] ;
+--ken ResUsing ["Uu"]["Ss"]["Ii"]["Nn"]["Gg"] ; -- Not used here
+--ken ResWhen ["Ww"]["Hh"]["Ee"]["Nn"] ; -- Not used here
+
+-- SciDb expressions (Precedence follows C language conventions)
+Eor . Exp ::= Exp ResOr Exp1 ;
+Eand . Exp1 ::= Exp1 ResAnd Exp2 ;
+Eeq . Exp2 ::= Exp2 "=" Exp3 ;
+Ene . Exp2 ::= Exp2 "<>" Exp3 ;
+Elt . Exp3 ::= Exp3 "<" Exp4 ;
+Egt . Exp3 ::= Exp3 ">" Exp4 ;
+Ele . Exp3 ::= Exp3 "<=" Exp4 ;
+Ege . Exp3 ::= Exp3 ">=" Exp4 ;
+EAdd . Exp4 ::= Exp4 "+" Exp5 ;
+ESub . Exp4 ::= Exp4 "-" Exp5 ;
+EMul . Exp5 ::= Exp5 "*" Exp6 ;
+EDiv . Exp5 ::= Exp5 "/" Exp6 ;
+EMod . Exp5 ::= Exp5 "%" Exp6 ;
+ENeg . Exp7 ::= "-" Exp6 ;
+EFunc . Exp8 ::= Id "(" [Exp] ")" ;
+separator Exp "," ;
+EVersion . Exp8 ::= Id "@" Integer ;
+EArrayVar . Exp8 ::= Id "." Id ;
+EOption . Exp8 ::= Id ":" Exp ; -- shift/reduce conflicts: +42
+EAsId . Exp9 ::= Exp8 ResAs Id ;
+EAsc . Exp9 ::= Exp8 ResAsc ;
+EDesc . Exp9 ::= Exp8 ResDesc ;
+EVar . Exp10::= Id ;
+EScheme . Exp10::= Schema ;
+EString . Exp10 ::= AString ;
+EFalse . Exp10 ::= ResFalse ;
+ETrue . Exp10 ::= ResTrue ;
+ENull . Exp10 ::= ResNull ;
+EInt . Exp10 ::= Integer ;
+EDouble . Exp10 ::= ADouble ;
+EWildcard . Exp10 ::= "*" ;
+EDefault . Exp10 ::= "?" ;
+coercions Exp 10 ;
+token ADouble digit+ (('.' digit+ (["Ee"] '-'? digit+)?)
+ |(["Ee"] '-'? digit+)
+ ) ;
+token AString ('\'' ((char - ["'\\"] ) | ('\\' ["'\\"]))* '\'') ;
+
+-- AFL
+Queries . AFL ::= [Query] ;
+terminator Query ";" ;
+QueryNil . Query ::= ;
+QueryExp . Query ::= Exp ;
+QueryArray . Query ::= ResCreate ResArray Id Schema ;
+QueryTemp . Query ::= ResCreate ResTemp ResArray Id Schema ;
+
+Scheme . Schema ::= "<" [Attribute] ">" "[" Dimensions "]" ;
+separator nonempty Attribute "," ;
+
+Attrib . Attribute ::= Id ":" Id NullableOption DefaultOption CompressionOption ;
+
+NullabeOff . NullableOption ::= ;
+NullableOn . NullableOption ::= ResNull ;
+NullableNot . NullableOption ::= ResNot ResNull ;
+DefaultOff . DefaultOption ::= ;
+DefaultOn . DefaultOption ::= ResDefault Exp6 ;
+CompressionOff . CompressionOption ::= ;
+CompressionOn . CompressionOption ::= ResCompression AString ;
+
+Dim . Dimensions ::= Dimension ;
+DimSemicolon . Dimensions ::= Dimension ";" Dimensions ;
+DimComma . Dimensions ::= Dimension "," Dimensions ; -- shift/reduce conflicts: +1
+DimId . Dimension ::= Id ;
+DimLoHi . Dimension ::= Id "=" Exp ":" Exp ;
+DimLoHiOverlap . Dimension ::= Id "=" Exp ":" Exp ":" Exp ;
+DimAll . Dimension ::= Id "=" Exp ":" Exp ":" Exp ":" Exp ;
+DimDeprecated . Dimension ::= Id "=" Exp ":" Exp "," Exp "," Exp ;
+
+--------------------------------------------------------------------------------
+
+-- Identifier (Id) is last as a catch all
+token Id letter (letter | digit | '_')* ;
diff --git a/src/Utils.hs b/src/Utils.hs
new file mode 100644
index 0000000..dad6f5d
--- /dev/null
+++ b/src/Utils.hs
@@ -0,0 +1,101 @@
+{-# LANGUAGE Safe #-}
+module Utils (checkMajorVersion
+ ,cleanDoubleQuotes
+ ,deEscapeSingleQuotes
+ ,dot
+ ,escapeSingleQuotes
+ ,nolines
+ ,replace
+ ,strip
+ ,stripUsing
+ ,toDoubleQuotedStr
+ ,toSingleQuotedStr
+ ,wrap
+ ,wrapUsing
+ )
+where
+
+import Data.Char (isSpace)
+import Data.List (findIndices,intercalate)
+import Data.List.Split (splitOn)
+import Data.Maybe (fromMaybe)
+import Safe (lastDef,readMay)
+
+-- | Given a comparison and a string return true or false:
+--
+-- > *Utils> checkMajorVersion (18>=) "18.1.0"
+-- > True
+-- > *Utils> checkMajorVersion (18>=) "19.3"
+-- > False
+-- > *Utils> checkMajorVersion (>=19) "19.3"
+-- > True
+-- > *Utils> checkMajorVersion (>=19) "18.1.0"
+-- > False
+--
+checkMajorVersion :: (Int -> t) -> String -> t
+checkMajorVersion f s = f (fromMaybe 0 (readMay (takeWhile (/='.') s) :: Maybe Int))
+
+-- | 'strip' away leading and trailing space.
+strip :: String -> String
+strip = stripUsing isSpace
+
+-- | If at all possible, 'wrap' a string @s@ into strings of length less
+-- than or equal to @l@ breaking with 'isSpace'.
+wrap :: Int -> String -> [String]
+wrap = wrapUsing isSpace
+
+-- | 'stripUsing' predicate @p@ leading and trailing @p x@ true.
+stripUsing :: (a -> Bool) -> [a] -> [a]
+stripUsing p = dropWhile p . reverse . dropWhile p . reverse
+
+-- | 'wrapUsing' predicate @p@ a list @xs@ into lists of length less
+-- than or equal to @l@ breaking on @p x@ true.
+wrapUsing :: (a -> Bool) -> Int -> [a] -> [[a]]
+wrapUsing p l s =
+ if length s' < l || null is
+ then [s']
+ else hd:wrapUsing p l tl
+ where s' = stripUsing p s
+ is = findIndices p s'
+ (hd, tl) = splitAt i s'
+ i = (lastDef (head is) . takeWhile (<=l)) is
+
+-- | 'dot' = \".\"
+dot :: FilePath
+dot = "."
+
+-- | Make a double quoted string from a single quoted string, a SciDB
+-- string.
+
+toDoubleQuotedStr :: String -> String
+toDoubleQuotedStr = replace "\"" "'" . stripUsing (=='\'') . replace "\\'" "\""
+
+-- | Make a single quoted string which is a SciDB string.
+
+toSingleQuotedStr :: String -> String
+toSingleQuotedStr s = "'" ++ escapeSingleQuotes s ++ "'"
+
+-- | De-Escape single quotes.
+deEscapeSingleQuotes :: String -> String
+deEscapeSingleQuotes = replace "\\'" "'"
+
+-- | Escape single quotes.
+escapeSingleQuotes :: String -> String
+escapeSingleQuotes = replace "'" "\\'"
+
+-- | Replaces newlines (\\n) with a space ( ).
+
+nolines :: String -> String
+nolines = replace "\n" " "
+
+-- | Replace needle in a haystack with replacement.
+
+replace :: Eq a => [a] -> [a] -> [a] -> [a]
+replace needle replacement haystack =
+ intercalate replacement (splitOn needle haystack)
+
+-- | Replace escaped double quotes (\") by single quotes (')
+-- and remove double qoutes (").
+
+cleanDoubleQuotes :: String -> String
+cleanDoubleQuotes = replace "\"" "" . replace "\\\"" "'"
diff --git a/src/UtilsUnsafe.hs b/src/UtilsUnsafe.hs
new file mode 100644
index 0000000..553db4d
--- /dev/null
+++ b/src/UtilsUnsafe.hs
@@ -0,0 +1,175 @@
+{-# LANGUAGE LambdaCase #-}
+module UtilsUnsafe
+ (base64Sha512Hash
+ ,fetchPassword
+ ,fetchUsername
+ ,isConnectable
+ ,managerSettings
+ ,putOrPageStrLn
+ ,VALID(..)
+ ,valid
+ )
+where
+
+import qualified Data.ByteString as B (empty)
+import qualified Data.ByteString.Char8 as C (pack)
+
+import Control.Monad (unless)
+import Crypto.Hash --()
+import Data.Char (toLower)
+import Data.Default.Class (def)
+import Data.Maybe (fromMaybe,fromJust,isNothing)
+import Data.X509.CertificateStore (CertificateStore)
+import Network.Connection (TLSSettings(..))
+import Network.HTTP.Client (ManagerSettings)
+import Network.HTTP.Client.TLS (mkManagerSettings)
+import Network.Socket (addrAddress,addrFamily,addrProtocol,addrSocketType,close,connect,getAddrInfo,socket)
+import Network.TLS (Shared(..),ClientParams(..),Supported(..),defaultParamsClient)
+import Network.TLS.Extra.Cipher (ciphersuite_default)
+import Safe (readMay)
+import System.Console.Haskeline (Settings,autoAddHistory,defaultSettings,getInputLine,getPassword,runInputT)
+import System.Environment (getEnvironment)
+import System.Exit (ExitCode(..))
+import System.IO (IOMode(..),openFile,hFlush,hClose,hPutStr,hPutStrLn,stderr)
+import System.IO.Error (ioeGetErrorString,tryIOError)
+import System.Process (createProcess,shell,CreateProcess(..),StdStream(..),waitForProcess)
+import Text.Hostname (validHostname)
+
+import ErrM (Err(..))
+import Interpreter (Results(..),interpret)
+import Utils (toSingleQuotedStr)
+
+import Crypto.Hash (hashWith, SHA512 (..))
+import Data.ByteString (ByteString)
+import Data.ByteArray.Encoding (convertToBase, Base (Base64))
+import Data.Text (pack)
+import Data.Text.Encoding (encodeUtf8)
+
+-- | Given a string, return a Base64, SHA512 hash.
+base64Sha512Hash s =
+ let bs = encodeUtf8 $ pack s
+ digest = convertToBase Base64 (hashWith SHA512 bs)
+ in show (digest :: ByteString)
+
+-- | Put a string or page it if the environmental variable PAGER is set.
+putOrPageStrLn :: String -> IO ExitCode
+putOrPageStrLn str
+ | null str = return ExitSuccess
+ | otherwise =
+ do pager <- fmap (lookup "PAGER") getEnvironment
+ if isNothing pager
+ then putStrLn str >> return ExitSuccess
+ else do (inh, _, _, pid) <- createProcess (shell $ fromJust pager){std_in = CreatePipe}
+ unless (isNothing inh) $ do hPutStr (fromJust inh) str
+ hFlush (fromJust inh)
+ hClose (fromJust inh)
+ waitForProcess pid
+
+data VALID = HOSTNAME | PORT | PROTOCOL | HISTORY | READABLE | PREFIX
+
+-- | Is the string a valid 'VALID'?
+--
+-- > valid HOSTNAME "localhost"
+-- > valid PORT "8080"
+-- > valid PROTOCOL "http"
+-- > valid READABLE "/path_to_query_file/file"
+-- > -- Terminating semi-colon (;) optional
+-- > valid PREFIX "set_namespace('sensor_data');"
+-- > valid HISTORY "HOME/.hquery_history"
+--
+-- where HOME is replaced by the home directory of the user if it
+-- exists, otherwise /tmp.
+
+valid :: VALID -> String -> IO Bool
+valid HOSTNAME s = if (validHostname . C.pack) (fmap toLower s)
+ then return True
+ else do hPutStrLn stderr ("Bad hostname '" ++ s ++ "'")
+ return False
+
+valid PORT s = if maybe False (\i -> 0 < i && i < 65536) (readMay s :: Maybe Int)
+ then return True
+ else do hPutStrLn stderr ("Bad port number '" ++ s ++ "'")
+ return False
+
+valid PROTOCOL s = let t = fmap toLower s
+ in if t == "http" || t == "https"
+ then return True
+ else do hPutStrLn stderr ("Bad protocol '" ++ s ++ "'")
+ return False
+
+valid HISTORY s = do result <- tryIOError (openFile s AppendMode)
+ either (\ioe -> do {putIOE "Bad history file" s ioe; return False})
+ (\h -> do {hClose h; return True})
+ result
+
+valid READABLE s = do result <- tryIOError (openFile s ReadMode)
+ either (\ioe -> do {putIOE "Unreadable file" s ioe; return False})
+ (\h -> do {hClose h; return True})
+ result
+
+valid PREFIX s = let s' = s ++ ";"
+ err = interpret s'
+ in do b <- case err of
+ Bad m -> do hPutStrLn stderr ("Input " ++ m)
+ return False
+ Ok rs -> return $ all (\case
+ Yes _ -> True
+ No _ -> True
+ Unknown _ -> True
+ _ -> False
+ ) rs
+ if null s || b then return True
+ else do hPutStrLn stderr ("Bad prefix " ++ toSingleQuotedStr s')
+ return False
+
+-- | Return true if one can connect to hostname @h@ and port @p@,
+-- otherwise false with a message sent to stderr.
+isConnectable :: String -> String -> IO Bool
+isConnectable h p =
+ do addrs' <- tryIOError (getAddrInfo Nothing (Just h) (Just p))
+ either (\ioe -> do {putIOE "Bad hostname:port" (h++":"++p) ioe; return False})
+ (\addrs -> do let addr = head addrs
+ sock <- socket (addrFamily addr) (addrSocketType addr) (addrProtocol addr)
+ result <- tryIOError (connect sock (addrAddress addr))
+ either (\ioe -> do {putIOE "Cannot connect:" (h++":"++p) ioe; return False})
+ (\_ -> do {close sock; return True})
+ result
+ )
+ addrs'
+
+putIOE :: String -> String -> IOError -> IO ()
+putIOE p s ioe = hPutStrLn stderr (p ++ " '" ++ s ++ "' (" ++ ioeGetErrorString ioe ++ ")")
+
+-- | Fetch the user name with prompt @Username@ or prompt string @s@.
+fetchUsername :: String -> IO String
+fetchUsername s = let s' = if null s then "Username: " else s ++ ": "
+ in fromMaybe "" <$> runInputT safeSettings (getInputLine s')
+
+-- | Fetch the password with prompt @Password@ or prompt string @s@ and
+-- masking character @c@ otherwise @*@.
+
+fetchPassword :: Maybe Char -> String -> IO String
+fetchPassword m s = let s' = if null s then "Password: " else s ++ ": "
+ c = fromMaybe '*' m
+ in do s <- fromMaybe "" <$> runInputT safeSettings (getPassword (Just c) s')
+ putStrLn ""
+ return s
+
+safeSettings :: Settings IO
+safeSettings = defaultSettings{autoAddHistory = False}
+
+-- | Given a certificate store, create manager settings for SSL/TLS
+-- connections.
+
+managerSettings :: CertificateStore -> ManagerSettings
+managerSettings store = mkManagerSettings settings Nothing
+ where settings = TLSSettings params
+ params = (defaultParamsClient "" B.empty) {
+ clientUseServerNameIndication = True
+ , clientShared = def {
+ sharedCAStore = store
+ }
+ , clientSupported = def {
+ supportedCiphers = ciphersuite_default
+ }
+ }