1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: Apache-2.0
15 type CustomFileSystem interface {
17 MountByID(mount string)
18 MountProject(mount, uuid string)
19 MountUsers(mount string)
20 ForwardSlashNameSubstitution(string)
23 type customFileSystem struct {
28 staleThreshold time.Time
31 forwardSlashNameSubstitution string
38 func (c *Client) CustomFileSystem(kc keepClient) CustomFileSystem {
40 fs := &customFileSystem{
42 fileSystem: fileSystem{
43 fsBackend: keepBackend{apiClient: c, keepClient: kc},
45 thr: newThrottle(concurrentWriters),
48 root.treenode = treenode{
53 mode: os.ModeDir | 0755,
56 inodes: make(map[string]inode),
58 fs.byID = map[string]inode{}
59 fs.byIDRoot = &treenode{
62 inodes: make(map[string]inode),
64 name: "_internal_by_id",
66 mode: 0755 | os.ModeDir,
72 func (fs *customFileSystem) MountByID(mount string) {
73 fs.root.treenode.Lock()
74 defer fs.root.treenode.Unlock()
75 fs.root.treenode.Child(mount, func(inode) (inode, error) {
80 inodes: make(map[string]inode),
84 mode: 0755 | os.ModeDir,
87 create: fs.newCollectionOrProjectHardlink,
92 func (fs *customFileSystem) MountProject(mount, uuid string) {
93 fs.root.treenode.Lock()
94 defer fs.root.treenode.Unlock()
95 fs.root.treenode.Child(mount, func(inode) (inode, error) {
96 return fs.newProjectDir(fs.root, mount, uuid, nil), nil
100 func (fs *customFileSystem) MountUsers(mount string) {
101 fs.root.treenode.Lock()
102 defer fs.root.treenode.Unlock()
103 fs.root.treenode.Child(mount, func(inode) (inode, error) {
106 loadOne: fs.usersLoadOne,
107 loadAll: fs.usersLoadAll,
111 inodes: make(map[string]inode),
115 mode: 0755 | os.ModeDir,
122 func (fs *customFileSystem) ForwardSlashNameSubstitution(repl string) {
123 fs.forwardSlashNameSubstitution = repl
126 // SiteFileSystem returns a FileSystem that maps collections and other
127 // Arvados objects onto a filesystem layout.
129 // This is experimental: the filesystem layout is not stable, and
130 // there are significant known bugs and shortcomings. For example,
131 // writes are not persisted until Sync() is called.
132 func (c *Client) SiteFileSystem(kc keepClient) CustomFileSystem {
133 fs := c.CustomFileSystem(kc)
134 fs.MountByID("by_id")
135 fs.MountUsers("users")
139 func (fs *customFileSystem) Sync() error {
140 return fs.byIDRoot.Sync()
143 // Stale returns true if information obtained at time t should be
145 func (fs *customFileSystem) Stale(t time.Time) bool {
147 defer fs.staleLock.Unlock()
148 return !fs.staleThreshold.Before(t)
151 func (fs *customFileSystem) newNode(name string, perm os.FileMode, modTime time.Time) (node inode, err error) {
152 return nil, ErrInvalidOperation
155 func (fs *customFileSystem) newCollectionOrProjectHardlink(parent inode, id string) (inode, error) {
159 // Avoid the extra remote API lookup if we already
160 // have a singleton for this ID.
162 return &hardlink{inode: n, parent: parent, name: id}, nil
166 if strings.Contains(id, "-4zz18-") || pdhRegexp.MatchString(id) {
167 node, err := fs.collectionSingleton(id)
168 if os.IsNotExist(err) {
170 } else if err != nil {
173 return &hardlink{inode: node, parent: parent, name: id}, nil
174 } else if strings.Contains(id, "-j7d0g-") || strings.Contains(id, "-tpzed-") {
175 proj, err := fs.getProject(id)
176 if os.IsNotExist(err) {
178 } else if err != nil {
181 node := fs.projectSingleton(id, proj)
182 return &hardlink{inode: node, parent: parent, name: id}, nil
188 func (fs *customFileSystem) projectSingleton(uuid string, proj *Group) inode {
190 defer fs.byIDLock.Unlock()
191 if n := fs.byID[uuid]; n != nil {
196 // special case uuid=="" implements the "home project"
197 // (owner_uuid == current user uuid)
200 var projLoading sync.Mutex
203 loadOne: func(parent inode, name string) (inode, error) { return fs.projectsLoadOne(parent, uuid, name) },
204 loadAll: func(parent inode) ([]inode, error) { return fs.projectsLoadAll(parent, uuid) },
208 inodes: make(map[string]inode),
212 mode: 0755 | os.ModeDir,
213 sys: func() interface{} {
215 defer projLoading.Unlock()
219 g, err := fs.getProject(uuid)
233 func (fs *customFileSystem) getProject(uuid string) (*Group, error) {
235 err := fs.RequestAndDecode(&g, "GET", "arvados/v1/groups/"+uuid, nil, nil)
236 if statusErr, ok := err.(interface{ HTTPStatus() int }); ok && statusErr.HTTPStatus() == http.StatusNotFound {
237 return nil, os.ErrNotExist
238 } else if err != nil {
244 func (fs *customFileSystem) collectionSingleton(id string) (inode, error) {
246 if n := fs.byID[id]; n != nil {
252 coll, err := fs.getCollection(id)
256 newfs, err := coll.FileSystem(fs, fs)
260 cfs := newfs.(*collectionFileSystem)
261 cfs.SetParent(fs.byIDRoot, id)
264 defer fs.byIDLock.Unlock()
265 if n := fs.byID[id]; n != nil {
269 fs.byIDRoot.Child(id, func(inode) (inode, error) { return cfs, nil })
273 func (fs *customFileSystem) getCollection(id string) (*Collection, error) {
275 err := fs.RequestAndDecode(&coll, "GET", "arvados/v1/collections/"+id, nil, nil)
276 if statusErr, ok := err.(interface{ HTTPStatus() int }); ok && statusErr.HTTPStatus() == http.StatusNotFound {
277 return nil, os.ErrNotExist
278 } else if err != nil {
282 // This means id is a PDH, and controller/railsapi
283 // returned one of (possibly) many collections with
284 // that PDH. Even if controller returns more fields
285 // besides PDH and manifest text (which are equal for
286 // all matching collections), we don't want to expose
287 // them (e.g., through Sys()).
289 PortableDataHash: coll.PortableDataHash,
290 ManifestText: coll.ManifestText,
296 // vdirnode wraps an inode by rejecting (with ErrInvalidOperation)
297 // calls that add/replace children directly, instead calling a
298 // create() func when a non-existing child is looked up.
300 // create() can return either a new node, which will be added to the
301 // treenode, or nil for ENOENT.
302 type vdirnode struct {
304 create func(parent inode, name string) (inode, error)
307 func (vn *vdirnode) Child(name string, replace func(inode) (inode, error)) (inode, error) {
308 return vn.treenode.Child(name, func(existing inode) (inode, error) {
309 if existing == nil && vn.create != nil {
310 newnode, err := vn.create(vn, name)
315 newnode.SetParent(vn, name)
317 vn.treenode.fileinfo.modTime = time.Now()
322 } else if tryRepl, err := replace(existing); err != nil {
324 } else if tryRepl != existing {
325 return existing, ErrInvalidOperation
332 // A hardlink can be used to mount an existing node at an additional
333 // point in the same filesystem.
334 type hardlink struct {
340 func (hl *hardlink) Sync() error {
341 if node, ok := hl.inode.(syncer); ok {
344 return ErrInvalidOperation
348 func (hl *hardlink) SetParent(parent inode, name string) {
355 func (hl *hardlink) Parent() inode {
361 func (hl *hardlink) FileInfo() os.FileInfo {
362 fi := hl.inode.FileInfo()
363 if fi, ok := fi.(fileinfo); ok {