1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
18 "git.curoverse.com/arvados.git/sdk/go/arvados"
20 "golang.org/x/net/context"
21 "golang.org/x/net/webdav"
25 lockPrefix string = uuid()
26 nextLockSuffix int64 = prand.Int63()
27 errReadOnly = errors.New("read-only filesystem")
30 // webdavFS implements a webdav.FileSystem by wrapping an
31 // arvados.CollectionFilesystem.
33 // Collections don't preserve empty directories, so Mkdir is
34 // effectively a no-op, and we need to make parent dirs spring into
35 // existence automatically so sequences like "mkcol foo; put foo/bar"
37 type webdavFS struct {
38 collfs arvados.CollectionFileSystem
42 func (fs *webdavFS) makeparents(name string) {
43 dir, name := path.Split(name)
44 if dir == "" || dir == "/" {
47 dir = dir[:len(dir)-1]
49 fs.collfs.Mkdir(dir, 0755)
52 func (fs *webdavFS) Mkdir(ctx context.Context, name string, perm os.FileMode) error {
56 name = strings.TrimRight(name, "/")
58 return fs.collfs.Mkdir(name, 0755)
61 func (fs *webdavFS) OpenFile(ctx context.Context, name string, flag int, perm os.FileMode) (f webdav.File, err error) {
62 writing := flag&(os.O_WRONLY|os.O_RDWR) != 0
65 return nil, errReadOnly
69 f, err = fs.collfs.OpenFile(name, flag, perm)
73 func (fs *webdavFS) RemoveAll(ctx context.Context, name string) error {
74 return fs.collfs.RemoveAll(name)
77 func (fs *webdavFS) Rename(ctx context.Context, oldName, newName string) error {
81 fs.makeparents(newName)
82 return fs.collfs.Rename(oldName, newName)
85 func (fs *webdavFS) Stat(ctx context.Context, name string) (os.FileInfo, error) {
89 return fs.collfs.Stat(name)
92 // noLockSystem implements webdav.LockSystem by returning success for
93 // every possible locking operation, even though it has no side
94 // effects such as actually locking anything. This works for a
95 // read-only webdav filesystem because webdav locks only apply to
98 // This is more suitable than webdav.NewMemLS() for two reasons:
99 // First, it allows keep-web to use one locker for all collections
100 // even though coll1.vhost/foo and coll2.vhost/foo have the same path
101 // but represent different resources. Additionally, it returns valid
102 // tokens (rfc2518 specifies that tokens are represented as URIs and
103 // are unique across all resources for all time), which might improve
104 // client compatibility.
106 // However, it does also permit impossible operations, like acquiring
107 // conflicting locks and releasing non-existent locks. This might
108 // confuse some clients if they try to probe for correctness.
110 // Currently this is a moot point: the LOCK and UNLOCK methods are not
111 // accepted by keep-web, so it suffices to implement the
112 // webdav.LockSystem interface.
113 type noLockSystem struct{}
115 func (*noLockSystem) Confirm(time.Time, string, string, ...webdav.Condition) (func(), error) {
119 func (*noLockSystem) Create(now time.Time, details webdav.LockDetails) (token string, err error) {
120 return fmt.Sprintf("opaquelocktoken:%s-%x", lockPrefix, atomic.AddInt64(&nextLockSuffix, 1)), nil
123 func (*noLockSystem) Refresh(now time.Time, token string, duration time.Duration) (webdav.LockDetails, error) {
124 return webdav.LockDetails{}, nil
127 func (*noLockSystem) Unlock(now time.Time, token string) error {
133 // Return a version 1 variant 4 UUID, meaning all bits are random
134 // except the ones indicating the version and variant.
137 if _, err := rand.Read(data[:]); err != nil {
141 data[8] = data[8]&0x3f | 0x80
143 data[6] = data[6]&0x0f | 0x40
144 return fmt.Sprintf("%x-%x-%x-%x-%x", data[0:4], data[4:6], data[6:8], data[8:10], data[10:])