//
// SPDX-License-Identifier: AGPL-3.0
-package keepweb
+// Package webdavfs adds special behaviors to an arvados.FileSystem so
+// it's suitable to use with a webdav server.
+package webdavfs
import (
+ "context"
"crypto/rand"
"errors"
"fmt"
"io"
prand "math/rand"
"os"
- "path"
"strings"
"sync/atomic"
"time"
"git.arvados.org/arvados.git/sdk/go/arvados"
-
- "golang.org/x/net/context"
"golang.org/x/net/webdav"
)
var (
lockPrefix string = uuid()
nextLockSuffix int64 = prand.Int63()
- errReadOnly = errors.New("read-only filesystem")
+ ErrReadOnly = errors.New("read-only filesystem")
)
-// webdavFS implements a webdav.FileSystem by wrapping an
+// FS implements a webdav.FileSystem by wrapping an
// arvados.CollectionFilesystem.
-//
-// Collections don't preserve empty directories, so Mkdir is
-// effectively a no-op, and we need to make parent dirs spring into
-// existence automatically so sequences like "mkcol foo; put foo/bar"
-// work as expected.
-type webdavFS struct {
- collfs arvados.FileSystem
- // prefix works like fs.Sub: Stat(name) calls
+type FS struct {
+ FileSystem arvados.FileSystem
+ // Prefix works like fs.Sub: Stat(name) calls
// Stat(prefix+name) in the wrapped filesystem.
- prefix string
- writing bool
+ Prefix string
+ // If Writing is false, all write operations return errors.
+ // (Opening a file for writing succeeds -- otherwise webdav
+ // would return 404 -- but writing to it fails.)
+ Writing bool
// webdav PROPFIND reads the first few bytes of each file
// whose filename extension isn't recognized, which is
// prohibitively expensive: we end up fetching multiple 64MiB
// blocks. Avoid this by returning EOF on all reads when
// handling a PROPFIND.
- alwaysReadEOF bool
+ AlwaysReadEOF bool
}
-func (fs *webdavFS) makeparents(name string) {
- if !fs.writing {
- return
- }
- dir, _ := path.Split(name)
- if dir == "" || dir == "/" {
- return
- }
- dir = dir[:len(dir)-1]
- fs.makeparents(dir)
- fs.collfs.Mkdir(fs.prefix+dir, 0755)
-}
-
-func (fs *webdavFS) Mkdir(ctx context.Context, name string, perm os.FileMode) error {
- if !fs.writing {
- return errReadOnly
+func (fs *FS) Mkdir(ctx context.Context, name string, perm os.FileMode) error {
+ if !fs.Writing {
+ return ErrReadOnly
}
name = strings.TrimRight(name, "/")
- fs.makeparents(name)
- return fs.collfs.Mkdir(fs.prefix+name, 0755)
+ return fs.FileSystem.Mkdir(fs.Prefix+name, 0755)
}
-func (fs *webdavFS) OpenFile(ctx context.Context, name string, flag int, perm os.FileMode) (f webdav.File, err error) {
+func (fs *FS) OpenFile(ctx context.Context, name string, flag int, perm os.FileMode) (f webdav.File, err error) {
writing := flag&(os.O_WRONLY|os.O_RDWR|os.O_TRUNC) != 0
- if writing {
- fs.makeparents(name)
- }
- f, err = fs.collfs.OpenFile(fs.prefix+name, flag, perm)
- if !fs.writing {
+ f, err = fs.FileSystem.OpenFile(fs.Prefix+name, flag, perm)
+ if !fs.Writing {
// webdav module returns 404 on all OpenFile errors,
// but returns 405 Method Not Allowed if OpenFile()
// succeeds but Write() or Close() fails. We'd rather
// file is opened for writing *or* Write() is called.
var err error
if writing {
- err = errReadOnly
+ err = ErrReadOnly
}
f = writeFailer{File: f, err: err}
}
- if fs.alwaysReadEOF {
+ if fs.AlwaysReadEOF {
f = readEOF{File: f}
}
return
}
-func (fs *webdavFS) RemoveAll(ctx context.Context, name string) error {
- return fs.collfs.RemoveAll(fs.prefix + name)
+func (fs *FS) RemoveAll(ctx context.Context, name string) error {
+ return fs.FileSystem.RemoveAll(fs.Prefix + name)
}
-func (fs *webdavFS) Rename(ctx context.Context, oldName, newName string) error {
- if !fs.writing {
- return errReadOnly
+func (fs *FS) Rename(ctx context.Context, oldName, newName string) error {
+ if !fs.Writing {
+ return ErrReadOnly
}
if strings.HasSuffix(oldName, "/") {
// WebDAV "MOVE foo/ bar/" means rename foo to bar.
oldName = oldName[:len(oldName)-1]
newName = strings.TrimSuffix(newName, "/")
}
- fs.makeparents(newName)
- return fs.collfs.Rename(fs.prefix+oldName, fs.prefix+newName)
+ return fs.FileSystem.Rename(fs.Prefix+oldName, fs.Prefix+newName)
}
-func (fs *webdavFS) Stat(ctx context.Context, name string) (os.FileInfo, error) {
- if fs.writing {
- fs.makeparents(name)
- }
- return fs.collfs.Stat(fs.prefix + name)
+func (fs *FS) Stat(ctx context.Context, name string) (os.FileInfo, error) {
+ return fs.FileSystem.Stat(fs.Prefix + name)
}
type writeFailer struct {
}
func (wf writeFailer) Write([]byte) (int, error) {
- wf.err = errReadOnly
+ wf.err = ErrReadOnly
return 0, wf.err
}
return 0, io.EOF
}
-// noLockSystem implements webdav.LockSystem by returning success for
+// NoLockSystem implements webdav.LockSystem by returning success for
// every possible locking operation, even though it has no side
// effects such as actually locking anything. This works for a
// read-only webdav filesystem because webdav locks only apply to
// Currently this is a moot point: the LOCK and UNLOCK methods are not
// accepted by keep-web, so it suffices to implement the
// webdav.LockSystem interface.
+var NoLockSystem = noLockSystem{}
+
type noLockSystem struct{}
-func (*noLockSystem) Confirm(time.Time, string, string, ...webdav.Condition) (func(), error) {
+func (noLockSystem) Confirm(time.Time, string, string, ...webdav.Condition) (func(), error) {
return noop, nil
}
-func (*noLockSystem) Create(now time.Time, details webdav.LockDetails) (token string, err error) {
+func (noLockSystem) Create(now time.Time, details webdav.LockDetails) (token string, err error) {
return fmt.Sprintf("opaquelocktoken:%s-%x", lockPrefix, atomic.AddInt64(&nextLockSuffix, 1)), nil
}
-func (*noLockSystem) Refresh(now time.Time, token string, duration time.Duration) (webdav.LockDetails, error) {
+func (noLockSystem) Refresh(now time.Time, token string, duration time.Duration) (webdav.LockDetails, error) {
return webdav.LockDetails{}, nil
}
-func (*noLockSystem) Unlock(now time.Time, token string) error {
+func (noLockSystem) Unlock(now time.Time, token string) error {
return nil
}