1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: Apache-2.0
15 type CustomFileSystem interface {
17 MountByID(mount string)
18 MountProject(mount, uuid string)
19 MountUsers(mount string)
20 ForwardSlashNameSubstitution(string)
23 type customFileSystem struct {
28 staleThreshold time.Time
31 forwardSlashNameSubstitution string
38 func (c *Client) CustomFileSystem(kc keepClient) CustomFileSystem {
40 fs := &customFileSystem{
42 fileSystem: fileSystem{
43 fsBackend: keepBackend{apiClient: c, keepClient: kc},
45 thr: newThrottle(concurrentWriters),
48 root.treenode = treenode{
53 mode: os.ModeDir | 0755,
56 inodes: make(map[string]inode),
58 fs.byID = map[string]inode{}
59 fs.byIDRoot = &treenode{
62 inodes: make(map[string]inode),
64 name: "_internal_by_id",
66 mode: 0755 | os.ModeDir,
72 func (fs *customFileSystem) MountByID(mount string) {
73 fs.root.treenode.Lock()
74 defer fs.root.treenode.Unlock()
75 fs.root.treenode.Child(mount, func(inode) (inode, error) {
80 inodes: make(map[string]inode),
84 mode: 0755 | os.ModeDir,
87 create: fs.newCollectionOrProjectHardlink,
92 func (fs *customFileSystem) MountProject(mount, uuid string) {
93 fs.root.treenode.Lock()
94 defer fs.root.treenode.Unlock()
95 fs.root.treenode.Child(mount, func(inode) (inode, error) {
96 return fs.newProjectDir(fs.root, mount, uuid, nil), nil
100 func (fs *customFileSystem) MountUsers(mount string) {
101 fs.root.treenode.Lock()
102 defer fs.root.treenode.Unlock()
103 fs.root.treenode.Child(mount, func(inode) (inode, error) {
106 loadOne: fs.usersLoadOne,
107 loadAll: fs.usersLoadAll,
111 inodes: make(map[string]inode),
115 mode: 0755 | os.ModeDir,
122 func (fs *customFileSystem) ForwardSlashNameSubstitution(repl string) {
123 fs.forwardSlashNameSubstitution = repl
126 // SiteFileSystem returns a FileSystem that maps collections and other
127 // Arvados objects onto a filesystem layout.
129 // This is experimental: the filesystem layout is not stable, and
130 // there are significant known bugs and shortcomings. For example,
131 // writes are not persisted until Sync() is called.
132 func (c *Client) SiteFileSystem(kc keepClient) CustomFileSystem {
133 fs := c.CustomFileSystem(kc)
134 fs.MountByID("by_id")
135 fs.MountUsers("users")
139 func (fs *customFileSystem) Sync() error {
140 return fs.byIDRoot.Sync()
143 // Stale returns true if information obtained at time t should be
145 func (fs *customFileSystem) Stale(t time.Time) bool {
147 defer fs.staleLock.Unlock()
148 return !fs.staleThreshold.Before(t)
151 func (fs *customFileSystem) newNode(name string, perm os.FileMode, modTime time.Time) (node inode, err error) {
152 return nil, ErrInvalidOperation
155 func (fs *customFileSystem) newCollectionOrProjectHardlink(parent inode, id string) (inode, error) {
156 if strings.Contains(id, "-4zz18-") || pdhRegexp.MatchString(id) {
157 node, err := fs.collectionSingleton(id)
158 if os.IsNotExist(err) {
160 } else if err != nil {
163 return &hardlink{inode: node, parent: parent, name: id}, nil
164 } else if strings.Contains(id, "-j7d0g-") || strings.Contains(id, "-tpzed-") {
169 // Look up the project synchronously before
170 // calling projectSingleton (otherwise we
171 // wouldn't detect a nonexistent project until
172 // it's too late to return ErrNotExist).
173 proj, err := fs.getProject(id)
174 if os.IsNotExist(err) {
176 } else if err != nil {
179 node = fs.projectSingleton(id, proj)
181 return &hardlink{inode: node, parent: parent, name: id}, nil
187 func (fs *customFileSystem) projectSingleton(uuid string, proj *Group) inode {
189 defer fs.byIDLock.Unlock()
190 if n := fs.byID[uuid]; n != nil {
195 // special case uuid=="" implements the "home project"
196 // (owner_uuid == current user uuid)
199 var projLoading sync.Mutex
202 loadOne: func(parent inode, name string) (inode, error) { return fs.projectsLoadOne(parent, uuid, name) },
203 loadAll: func(parent inode) ([]inode, error) { return fs.projectsLoadAll(parent, uuid) },
207 inodes: make(map[string]inode),
211 mode: 0755 | os.ModeDir,
212 sys: func() interface{} {
214 defer projLoading.Unlock()
218 g, err := fs.getProject(uuid)
232 func (fs *customFileSystem) getProject(uuid string) (*Group, error) {
234 err := fs.RequestAndDecode(&g, "GET", "arvados/v1/groups/"+uuid, nil, nil)
235 if statusErr, ok := err.(interface{ HTTPStatus() int }); ok && statusErr.HTTPStatus() == http.StatusNotFound {
236 return nil, os.ErrNotExist
237 } else if err != nil {
243 func (fs *customFileSystem) collectionSingleton(id string) (inode, error) {
244 // Return existing singleton, if we have it
246 existing := fs.byID[id]
252 coll, err := fs.getCollection(id)
256 newfs, err := coll.FileSystem(fs, fs)
260 cfs := newfs.(*collectionFileSystem)
261 cfs.SetParent(fs.byIDRoot, id)
263 // Check again in case another goroutine has added a node to
264 // fs.byID since we checked above.
266 defer fs.byIDLock.Unlock()
267 if existing = fs.byID[id]; existing != nil {
268 // Other goroutine won the race. Discard the node we
269 // just made, and return the race winner.
272 // We won the race. Save the new node in fs.byID and
276 defer fs.byIDRoot.Unlock()
277 fs.byIDRoot.Child(id, func(inode) (inode, error) { return cfs, nil })
281 func (fs *customFileSystem) getCollection(id string) (*Collection, error) {
283 err := fs.RequestAndDecode(&coll, "GET", "arvados/v1/collections/"+id, nil, nil)
284 if statusErr, ok := err.(interface{ HTTPStatus() int }); ok && statusErr.HTTPStatus() == http.StatusNotFound {
285 return nil, os.ErrNotExist
286 } else if err != nil {
290 // This means id is a PDH, and controller/railsapi
291 // returned one of (possibly) many collections with
292 // that PDH. Even if controller returns more fields
293 // besides PDH and manifest text (which are equal for
294 // all matching collections), we don't want to expose
295 // them (e.g., through Sys()).
297 PortableDataHash: coll.PortableDataHash,
298 ManifestText: coll.ManifestText,
304 // vdirnode wraps an inode by rejecting (with ErrInvalidOperation)
305 // calls that add/replace children directly, instead calling a
306 // create() func when a non-existing child is looked up.
308 // create() can return either a new node, which will be added to the
309 // treenode, or nil for ENOENT.
310 type vdirnode struct {
312 create func(parent inode, name string) (inode, error)
315 func (vn *vdirnode) Child(name string, replace func(inode) (inode, error)) (inode, error) {
316 return vn.treenode.Child(name, func(existing inode) (inode, error) {
317 if existing == nil && vn.create != nil {
318 newnode, err := vn.create(vn, name)
323 newnode.SetParent(vn, name)
325 vn.treenode.fileinfo.modTime = time.Now()
330 } else if tryRepl, err := replace(existing); err != nil {
332 } else if tryRepl != existing {
333 return existing, ErrInvalidOperation
340 // A hardlink can be used to mount an existing node at an additional
341 // point in the same filesystem.
342 type hardlink struct {
348 // If the wrapped inode is a filesystem, rootnode returns the wrapped
349 // fs's rootnode, otherwise inode itself. This allows
350 // (*fileSystem)Rename() to lock the root node of a hardlink-wrapped
352 func (hl *hardlink) rootnode() inode {
353 if node, ok := hl.inode.(interface{ rootnode() inode }); ok {
354 return node.rootnode()
360 func (hl *hardlink) Sync() error {
361 if node, ok := hl.inode.(syncer); ok {
364 return ErrInvalidOperation
368 func (hl *hardlink) SetParent(parent inode, name string) {
375 func (hl *hardlink) Parent() inode {
381 func (hl *hardlink) FileInfo() os.FileInfo {
382 fi := hl.inode.FileInfo()
383 if fi, ok := fi.(fileinfo); ok {