| // Copyright 2019 The Bazel Authors. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| |
| package com.google.devtools.build.lib.vfs; |
| |
| import static java.nio.charset.StandardCharsets.ISO_8859_1; |
| |
| import com.google.common.base.Preconditions; |
| import com.google.common.collect.Lists; |
| import com.google.common.io.ByteSource; |
| import com.google.common.io.CharStreams; |
| import com.google.devtools.build.lib.concurrent.ThreadSafety.ThreadSafe; |
| import com.google.devtools.build.lib.vfs.DigestHashFunction.DefaultHashFunctionNotSetException; |
| import java.io.FileNotFoundException; |
| import java.io.IOException; |
| import java.io.InputStream; |
| import java.io.InputStreamReader; |
| import java.io.OutputStream; |
| import java.nio.channels.ReadableByteChannel; |
| import java.nio.file.FileAlreadyExistsException; |
| import java.util.Collection; |
| import java.util.Iterator; |
| import java.util.List; |
| |
| /** |
| * This interface models a file system using UNIX the naming scheme. |
| */ |
| @ThreadSafe |
| public abstract class FileSystem { |
| |
| private final DigestHashFunction digestFunction; |
| |
| public FileSystem() throws DefaultHashFunctionNotSetException { |
| digestFunction = DigestHashFunction.getDefault(); |
| } |
| |
| public FileSystem(DigestHashFunction digestFunction) { |
| this.digestFunction = Preconditions.checkNotNull(digestFunction); |
| } |
| |
| public DigestHashFunction getDigestFunction() { |
| return digestFunction; |
| } |
| |
| /** |
| * An exception thrown when attempting to resolve an ordinary file as a symlink. |
| */ |
| protected static final class NotASymlinkException extends IOException { |
| public NotASymlinkException(Path path) { |
| super(path + " is not a symlink"); |
| } |
| } |
| |
| private final Root absoluteRoot = new Root.AbsoluteRoot(this); |
| |
| /** |
| * Returns an absolute path instance, given an absolute path name, without double slashes, .., or |
| * . segments. While this method will normalize the path representation by creating a |
| * structured/parsed representation, it will not cause any IO. (e.g., it will not resolve symbolic |
| * links if it's a Unix file system. |
| */ |
| public Path getPath(String path) { |
| return Path.create(path, this); |
| } |
| |
| /** Returns an absolute path instance, given an absolute path fragment. */ |
| public Path getPath(PathFragment pathFragment) { |
| Preconditions.checkArgument(pathFragment.isAbsolute()); |
| return Path.createAlreadyNormalized( |
| pathFragment.getPathString(), pathFragment.getDriveStrLength(), this); |
| } |
| |
| final Root getAbsoluteRoot() { |
| return absoluteRoot; |
| } |
| |
| /** |
| * Returns whether or not the FileSystem supports modifications of files and file entries. |
| * |
| * <p>Returns true if FileSystem supports the following: |
| * |
| * <ul> |
| * <li>{@link #setWritable(Path, boolean)} |
| * <li>{@link #setExecutable(Path, boolean)} |
| * </ul> |
| * |
| * The above calls will result in an {@link UnsupportedOperationException} on a FileSystem where |
| * this method returns {@code false}. |
| */ |
| public abstract boolean supportsModifications(Path path); |
| |
| /** |
| * Returns whether or not the FileSystem supports symbolic links. |
| * |
| * <p>Returns true if FileSystem supports the following: |
| * |
| * <ul> |
| * <li>{@link #createSymbolicLink(Path, PathFragment)} |
| * <li>{@link #getFileSize(Path, boolean)} where {@code followSymlinks=false} |
| * <li>{@link #getLastModifiedTime(Path, boolean)} where {@code followSymlinks=false} |
| * <li>{@link #readSymbolicLink(Path)} where the link points to a non-existent file |
| * </ul> |
| * |
| * The above calls may result in an {@link UnsupportedOperationException} on a FileSystem where |
| * this method returns {@code false}. The implementation can try to emulate these calls at its own |
| * discretion. |
| */ |
| public abstract boolean supportsSymbolicLinksNatively(Path path); |
| |
| /** |
| * Returns whether or not the FileSystem supports hard links. |
| * |
| * <p>Returns true if FileSystem supports the following: |
| * |
| * <ul> |
| * <li>{@link #createFSDependentHardLink(Path, Path)} |
| * </ul> |
| * |
| * The above calls may result in an {@link UnsupportedOperationException} on a FileSystem where |
| * this method returns {@code false}. The implementation can try to emulate these calls at its own |
| * discretion. |
| */ |
| protected abstract boolean supportsHardLinksNatively(Path path); |
| |
| /*** |
| * Returns true if file path is case-sensitive on this file system. Default is true. |
| */ |
| public abstract boolean isFilePathCaseSensitive(); |
| |
| /** |
| * Returns the type of the file system path belongs to. |
| * |
| * <p>The string returned is obtained directly from the operating system, so |
| * it's a best guess in absence of a guaranteed api. |
| * |
| * <p>This implementation uses <code>/proc/mounts</code> to determine the |
| * file system type. |
| */ |
| public String getFileSystemType(Path path) { |
| String fileSystem = "unknown"; |
| int bestMountPointSegmentCount = -1; |
| try { |
| Path canonicalPath = path.resolveSymbolicLinks(); |
| Path mountTable = path.getRelative("/proc/mounts"); |
| try (InputStreamReader reader = new InputStreamReader(mountTable.getInputStream(), |
| ISO_8859_1)) { |
| for (String line : CharStreams.readLines(reader)) { |
| String[] words = line.split("\\s+"); |
| if (words.length >= 3) { |
| if (!words[1].startsWith("/")) { |
| continue; |
| } |
| Path mountPoint = path.getFileSystem().getPath(words[1]); |
| int segmentCount = mountPoint.asFragment().segmentCount(); |
| if (canonicalPath.startsWith(mountPoint) && segmentCount > bestMountPointSegmentCount) { |
| bestMountPointSegmentCount = segmentCount; |
| fileSystem = words[2]; |
| } |
| } |
| } |
| } |
| } catch (IOException e) { |
| // pass |
| } |
| return fileSystem; |
| } |
| |
| /** |
| * Creates a directory with the name of the current path. See {@link Path#createDirectory} for |
| * specification. |
| */ |
| public abstract boolean createDirectory(Path path) throws IOException; |
| |
| /** |
| * Creates all directories up to the path. See {@link Path#createDirectoryAndParents} for |
| * specification. |
| */ |
| public abstract void createDirectoryAndParents(Path path) throws IOException; |
| |
| /** |
| * Returns the size in bytes of the file denoted by {@code path}. See {@link |
| * Path#getFileSize(Symlinks)} for specification. |
| * |
| * <p>Note: for <@link FileSystem>s where {@link #supportsSymbolicLinksNatively(Path)} returns |
| * false, this method will throw an {@link UnsupportedOperationException} if {@code |
| * followSymLinks=false}. |
| */ |
| protected abstract long getFileSize(Path path, boolean followSymlinks) throws IOException; |
| |
| /** Deletes the file denoted by {@code path}. See {@link Path#delete} for specification. */ |
| public abstract boolean delete(Path path) throws IOException; |
| |
| /** |
| * Deletes all directory trees recursively beneath the given path and removes that path as well. |
| * |
| * @param path the directory hierarchy to remove |
| * @throws IOException if the hierarchy cannot be removed successfully |
| */ |
| public void deleteTree(Path path) throws IOException { |
| deleteTreesBelow(path); |
| path.delete(); |
| } |
| |
| /** |
| * Deletes all directory trees recursively beneath the given path. Does nothing if the given path |
| * is not a directory. |
| * |
| * <p>This generic implementation is not as efficient as it could be: for example, we issue |
| * separate stats for each directory entry to determine if they are directories or not (instead of |
| * reusing the information that readdir returns), and we issue separate operations to toggle |
| * different permissions while they could be done at once via chmod. Subclasses can optimize this |
| * by taking advantage of platform-specific features. |
| * |
| * @param dir the directory hierarchy to remove |
| * @throws IOException if the hierarchy cannot be removed successfully |
| */ |
| public void deleteTreesBelow(Path dir) throws IOException { |
| if (dir.isDirectory(Symlinks.NOFOLLOW)) { |
| Collection<Path> entries; |
| try { |
| entries = dir.getDirectoryEntries(); |
| } catch (IOException e) { |
| // If we couldn't read the directory, it may be because it's not readable. Try granting this |
| // permission and retry. If the retry fails, give up. |
| dir.setReadable(true); |
| dir.setExecutable(true); |
| entries = dir.getDirectoryEntries(); |
| } |
| |
| Iterator<Path> iterator = entries.iterator(); |
| if (iterator.hasNext()) { |
| Path first = iterator.next(); |
| deleteTreesBelow(first); |
| try { |
| first.delete(); |
| } catch (IOException e) { |
| // If we couldn't delete the first entry in a directory, it may be because the directory |
| // (not the entry!) is not writable. Try granting this permission and retry. If the retry |
| // fails, give up. |
| dir.setWritable(true); |
| first.delete(); |
| } |
| } |
| while (iterator.hasNext()) { |
| Path path = iterator.next(); |
| deleteTreesBelow(path); |
| // No need to retry here: if needed, we already unprotected the directory earlier. |
| path.delete(); |
| } |
| } |
| } |
| |
| /** |
| * Returns the last modification time of the file denoted by {@code path}. See {@link |
| * Path#getLastModifiedTime(Symlinks)} for specification. |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsSymbolicLinksNatively(Path)} returns |
| * false, this method will throw an {@link UnsupportedOperationException} if {@code |
| * followSymLinks=false}. |
| */ |
| protected abstract long getLastModifiedTime(Path path, boolean followSymlinks) throws IOException; |
| |
| /** |
| * Sets the last modification time of the file denoted by {@code path}. See {@link |
| * Path#setLastModifiedTime} for specification. |
| */ |
| public abstract void setLastModifiedTime(Path path, long newTime) throws IOException; |
| |
| /** |
| * Returns value of the given extended attribute name or null if attribute does not exist or file |
| * system does not support extended attributes. Follows symlinks. |
| * |
| * <p>Default implementation assumes that file system does not support extended attributes and |
| * always returns null. Specific file system implementations should override this method if they |
| * do provide support for extended attributes. |
| * |
| * @param path the file whose extended attribute is to be returned. |
| * @param name the name of the extended attribute key. |
| * @param followSymlinks whether to follow symlinks or not; if false, returns the xattr of the |
| * link itself, not its target. |
| * @return the value of the extended attribute associated with 'path', if any, or null if no such |
| * attribute is defined (ENODATA) or file system does not support extended attributes at all. |
| * @throws IOException if the call failed for any other reason. |
| */ |
| public byte[] getxattr(Path path, String name, boolean followSymlinks) throws IOException { |
| return null; |
| } |
| |
| /** |
| * Gets a fast digest for the given path, or {@code null} if there isn't one available or the |
| * filesystem doesn't support them. This digest should be suitable for detecting changes to the |
| * file. |
| */ |
| protected byte[] getFastDigest(Path path) throws IOException { |
| return null; |
| } |
| |
| /** |
| * Returns the digest of the file denoted by the path, following symbolic links. |
| * |
| * <p>Subclasses may (and do) optimize this computation for a particular digest functions. |
| * |
| * @return a new byte array containing the file's digest |
| * @throws IOException if the digest could not be computed for any reason |
| */ |
| protected byte[] getDigest(final Path path) throws IOException { |
| return new ByteSource() { |
| @Override |
| public InputStream openStream() throws IOException { |
| return getInputStream(path); |
| } |
| }.hash(digestFunction.getHashFunction()).asBytes(); |
| } |
| |
| /** |
| * Returns true if "path" denotes an existing symbolic link. See |
| * {@link Path#isSymbolicLink} for specification. |
| */ |
| protected abstract boolean isSymbolicLink(Path path); |
| |
| /** |
| * Appends a single regular path segment 'child' to 'dir', recursively |
| * resolving symbolic links in 'child'. 'dir' must be canonical. 'maxLinks' is |
| * the maximum number of symbolic links that may be traversed before it gives |
| * up (the Linux kernel uses 32). |
| * |
| * <p>(This method does not need to be synchronized; but the result may be |
| * stale in the case of concurrent modification.) |
| * |
| * @throws IOException if 'dir' is not an existing directory; or if |
| * stat(child) fails for any reason, or if 'child' is a symlink and |
| * readlink(child) fails for any reason (e.g. ENOENT, EACCES), or if |
| * the chain of symbolic links exceeds 'maxLinks'. |
| */ |
| protected final Path appendSegment(Path dir, String child, int maxLinks) throws IOException { |
| Path naive = dir.getChild(child); |
| |
| PathFragment linkTarget = resolveOneLink(naive); |
| if (linkTarget == null) { |
| return naive; // regular file or directory |
| } |
| |
| if (maxLinks-- == 0) { |
| throw new IOException(naive + " (Too many levels of symbolic links)"); |
| } |
| if (linkTarget.isAbsolute()) { |
| dir = getPath(linkTarget.getDriveStr()); |
| } |
| for (String name : linkTarget.segments()) { |
| if (name.equals(".") || name.isEmpty()) { |
| // no-op |
| } else if (name.equals("..")) { |
| Path parent = dir.getParentDirectory(); |
| // root's parent is root, when canonicalizing, so this is a no-op. |
| if (parent != null) { dir = parent; } |
| } else { |
| dir = appendSegment(dir, name, maxLinks); |
| } |
| } |
| return dir; |
| } |
| |
| /** |
| * Helper method of {@link #resolveSymbolicLinks(Path)}. This method |
| * encapsulates the I/O component of a full canonicalization operation. |
| * Subclasses can (and do) provide more efficient implementations. |
| * |
| * <p>(This method does not need to be synchronized; but the result may be |
| * stale in the case of concurrent modification.) |
| * |
| * @param path a path, of which all but the last segment is guaranteed to be |
| * canonical |
| * @return {@link #readSymbolicLink} iff path is a symlink or null iff |
| * path exists but is not a symlink |
| * @throws IOException if the file did not exist, or a parent directory could |
| * not be searched |
| */ |
| protected PathFragment resolveOneLink(Path path) throws IOException { |
| try { |
| return readSymbolicLink(path); |
| } catch (NotASymlinkException e) { |
| // Not a symbolic link. Check it exists. |
| |
| // (A simple call to lstat would replace all of this.) |
| if (!exists(path, false)) { |
| throw new FileNotFoundException(path + " (No such file or directory)"); |
| } |
| |
| // TODO(bazel-team): (2009) ideally, throw ENOTDIR if dir is not a dir, but that |
| // would require twice as many stats, or a much more convoluted |
| // implementation (like glibc's canonicalize.c). |
| |
| return null; // exists. |
| } |
| } |
| |
| /** |
| * Returns the canonical path for the given path. See |
| * {@link Path#resolveSymbolicLinks} for specification. |
| */ |
| protected Path resolveSymbolicLinks(Path path) |
| throws IOException { |
| Path parentNode = path.getParentDirectory(); |
| return parentNode == null |
| ? path // (root) |
| : appendSegment(resolveSymbolicLinks(parentNode), path.getBaseName(), 32); |
| } |
| |
| /** |
| * Returns the status of a file. See {@link Path#stat(Symlinks)} for |
| * specification. |
| * |
| * <p>The default implementation of this method is a "lazy" one, based on |
| * other accessor methods such as {@link #isFile}, etc. Subclasses may provide |
| * more efficient specializations. However, we still try to follow Unix-like |
| * semantics of failing fast in case of non-existent files (or in case of |
| * permission issues). |
| */ |
| protected FileStatus stat(final Path path, final boolean followSymlinks) throws IOException { |
| FileStatus status = new FileStatus() { |
| volatile Boolean isFile; |
| volatile Boolean isDirectory; |
| volatile Boolean isSymbolicLink; |
| volatile Boolean isSpecial; |
| volatile long size = -1; |
| volatile long mtime = -1; |
| |
| @Override |
| public boolean isFile() { |
| if (isFile == null) { isFile = FileSystem.this.isFile(path, followSymlinks); } |
| return isFile; |
| } |
| |
| @Override |
| public boolean isDirectory() { |
| if (isDirectory == null) { |
| isDirectory = FileSystem.this.isDirectory(path, followSymlinks); |
| } |
| return isDirectory; |
| } |
| |
| @Override |
| public boolean isSymbolicLink() { |
| if (isSymbolicLink == null) { isSymbolicLink = FileSystem.this.isSymbolicLink(path); } |
| return isSymbolicLink; |
| } |
| |
| @Override |
| public boolean isSpecialFile() { |
| if (isSpecial == null) { isSpecial = FileSystem.this.isSpecialFile(path, followSymlinks); } |
| return isSpecial; |
| } |
| |
| @Override |
| public long getSize() throws IOException { |
| if (size == -1) { size = getFileSize(path, followSymlinks); } |
| return size; |
| } |
| |
| @Override |
| public long getLastModifiedTime() throws IOException { |
| if (mtime == -1) { mtime = FileSystem.this.getLastModifiedTime(path, followSymlinks); } |
| return mtime; |
| } |
| |
| @Override |
| public long getLastChangeTime() { |
| throw new UnsupportedOperationException(); |
| } |
| |
| @Override |
| public long getNodeId() { |
| throw new UnsupportedOperationException(); |
| } |
| }; |
| |
| // Fail fast in case if some operations will actually fail, since stat() call sometimes used |
| // to verify file existence as well. We will use getLastModifiedTime() method for that purpose. |
| status.getLastModifiedTime(); |
| |
| return status; |
| } |
| |
| /** |
| * Like stat(), but returns null on failures instead of throwing. |
| */ |
| protected FileStatus statNullable(Path path, boolean followSymlinks) { |
| try { |
| return stat(path, followSymlinks); |
| } catch (IOException e) { |
| return null; |
| } |
| } |
| |
| /** |
| * Like {@link #stat}, but returns null if the file is not found (corresponding to |
| * {@code ENOENT} or {@code ENOTDIR} in Unix's stat(2) function) instead of throwing. Note that |
| * this implementation does <i>not</i> successfully catch {@code ENOTDIR} exceptions. If the |
| * instantiated filesystem can catch such errors, it should override this method to do so. |
| */ |
| protected FileStatus statIfFound(Path path, boolean followSymlinks) throws IOException { |
| try { |
| return stat(path, followSymlinks); |
| } catch (FileNotFoundException e) { |
| return null; |
| } |
| } |
| |
| /** |
| * Returns true iff {@code path} denotes an existing directory. See |
| * {@link Path#isDirectory(Symlinks)} for specification. |
| */ |
| protected abstract boolean isDirectory(Path path, boolean followSymlinks); |
| |
| /** |
| * Returns true iff {@code path} denotes an existing regular or special file. |
| * See {@link Path#isFile(Symlinks)} for specification. |
| */ |
| protected abstract boolean isFile(Path path, boolean followSymlinks); |
| |
| /** |
| * Returns true iff {@code path} denotes a special file. |
| * See {@link Path#isSpecialFile(Symlinks)} for specification. |
| */ |
| protected abstract boolean isSpecialFile(Path path, boolean followSymlinks); |
| |
| /** |
| * Creates a symbolic link. See {@link Path#createSymbolicLink(Path)} for specification. |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsSymbolicLinksNatively(Path)} returns |
| * false, this method will throw an {@link UnsupportedOperationException} |
| */ |
| protected abstract void createSymbolicLink(Path linkPath, PathFragment targetFragment) |
| throws IOException; |
| |
| /** |
| * Returns the target of a symbolic link. See {@link Path#readSymbolicLink} for specification. |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsSymbolicLinksNatively(Path)} returns |
| * false, this method will throw an {@link UnsupportedOperationException} if the link points to a |
| * non-existent file. |
| * |
| * @throws NotASymlinkException if the current path is not a symbolic link |
| * @throws IOException if the contents of the link could not be read for any reason. |
| */ |
| protected abstract PathFragment readSymbolicLink(Path path) throws IOException; |
| |
| /** |
| * Returns the target of a symbolic link, under the assumption that the given path is indeed a |
| * symbolic link (this assumption permits efficient implementations). See |
| * {@link Path#readSymbolicLinkUnchecked} for specification. |
| * |
| * @throws IOException if the contents of the link could not be read for any reason. |
| */ |
| protected PathFragment readSymbolicLinkUnchecked(Path path) throws IOException { |
| return readSymbolicLink(path); |
| } |
| |
| /** Returns true iff this path denotes an existing file of any kind. Follows symbolic links. */ |
| public boolean exists(Path path) { |
| return exists(path, true); |
| } |
| |
| /** |
| * Returns true iff {@code path} denotes an existing file of any kind. See |
| * {@link Path#exists(Symlinks)} for specification. |
| */ |
| protected abstract boolean exists(Path path, boolean followSymlinks); |
| |
| /** |
| * Returns a collection containing the names of all entities within the directory denoted by the |
| * {@code path}. |
| * |
| * @throws IOException if there was an error reading the directory entries |
| */ |
| protected abstract Collection<String> getDirectoryEntries(Path path) throws IOException; |
| |
| protected static Dirent.Type direntFromStat(FileStatus stat) { |
| if (stat == null) { |
| return Dirent.Type.UNKNOWN; |
| } else if (stat.isSpecialFile()) { |
| return Dirent.Type.UNKNOWN; |
| } else if (stat.isFile()) { |
| return Dirent.Type.FILE; |
| } else if (stat.isDirectory()) { |
| return Dirent.Type.DIRECTORY; |
| } else if (stat.isSymbolicLink()) { |
| return Dirent.Type.SYMLINK; |
| } else { |
| return Dirent.Type.UNKNOWN; |
| } |
| } |
| |
| /** |
| * Returns a Dirents structure, listing the names of all entries within the |
| * directory {@code path}, plus their types (file, directory, other). |
| * |
| * @param followSymlinks whether to follow symlinks when determining the file types of |
| * individual directory entries. No matter the value of this parameter, symlinks are |
| * followed when resolving the directory whose entries are to be read. |
| * @throws IOException if there was an error reading the directory entries |
| */ |
| protected Collection<Dirent> readdir(Path path, boolean followSymlinks) throws IOException { |
| Collection<String> children = getDirectoryEntries(path); |
| List<Dirent> dirents = Lists.newArrayListWithCapacity(children.size()); |
| for (String child : children) { |
| Path childPath = path.getChild(child); |
| Dirent.Type type = direntFromStat(statNullable(childPath, followSymlinks)); |
| dirents.add(new Dirent(child, type)); |
| } |
| return dirents; |
| } |
| |
| /** |
| * Returns true iff the file represented by {@code path} is readable. |
| * |
| * @throws IOException if there was an error reading the file's metadata |
| */ |
| protected abstract boolean isReadable(Path path) throws IOException; |
| |
| /** |
| * Sets the file to readable (if the argument is true) or non-readable (if the argument is false) |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsModifications(Path)} returns false or |
| * which do not support unreadable files, this method will throw an {@link |
| * UnsupportedOperationException}. |
| * |
| * @throws IOException if there was an error reading or writing the file's metadata |
| */ |
| protected abstract void setReadable(Path path, boolean readable) throws IOException; |
| |
| /** |
| * Returns true iff the file represented by {@code path} is writable. |
| * |
| * @throws IOException if there was an error reading the file's metadata |
| */ |
| protected abstract boolean isWritable(Path path) throws IOException; |
| |
| /** |
| * Sets the file to writable (if the argument is true) or non-writable (if the argument is false) |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsModifications(Path)} returns false, this |
| * method will throw an {@link UnsupportedOperationException}. |
| * |
| * @throws IOException if there was an error reading or writing the file's metadata |
| */ |
| public abstract void setWritable(Path path, boolean writable) throws IOException; |
| |
| /** |
| * Returns true iff the file represented by the path is executable. |
| * |
| * @throws IOException if there was an error reading the file's metadata |
| */ |
| protected abstract boolean isExecutable(Path path) throws IOException; |
| |
| /** |
| * Sets the file to executable, if the argument is true. It is currently not supported to unset |
| * the executable status of a file, so {code executable=false} yields an {@link |
| * UnsupportedOperationException}. |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsModifications(Path)} returns false, this |
| * method will throw an {@link UnsupportedOperationException}. |
| * |
| * @throws IOException if there was an error reading or writing the file's metadata |
| */ |
| protected abstract void setExecutable(Path path, boolean executable) throws IOException; |
| |
| /** |
| * Sets the file permissions. If permission changes on this {@link FileSystem} are slow (e.g. one |
| * syscall per change), this method should aim to be faster than setting each permission |
| * individually. If this {@link FileSystem} does not support group or others permissions, those |
| * bits will be ignored. |
| * |
| * <p>Note: for {@link FileSystem}s where {@link #supportsModifications(Path)} returns false, this |
| * method will throw an {@link UnsupportedOperationException}. |
| * |
| * @throws IOException if there was an error reading or writing the file's metadata |
| */ |
| protected void chmod(Path path, int mode) throws IOException { |
| setReadable(path, (mode & 0400) != 0); |
| setWritable(path, (mode & 0200) != 0); |
| setExecutable(path, (mode & 0100) != 0); |
| } |
| |
| /** |
| * Creates an InputStream accessing the file denoted by the path. |
| * |
| * @throws IOException if there was an error opening the file for reading |
| */ |
| protected abstract InputStream getInputStream(Path path) throws IOException; |
| |
| /** |
| * Creates a ReadableFileChannel accessing the file denoted by the path. |
| * |
| * @throws IOException if there was an error opening the file for reading |
| */ |
| protected ReadableByteChannel createReadableByteChannel(Path path) throws IOException { |
| throw new UnsupportedOperationException(); |
| } |
| |
| /** |
| * Creates an OutputStream accessing the file denoted by path. |
| * |
| * @throws IOException if there was an error opening the file for writing |
| */ |
| protected final OutputStream getOutputStream(Path path) throws IOException { |
| return getOutputStream(path, false); |
| } |
| |
| /** |
| * Creates an OutputStream accessing the file denoted by path. |
| * |
| * @param append whether to open the output stream in append mode |
| * @throws IOException if there was an error opening the file for writing |
| */ |
| protected abstract OutputStream getOutputStream(Path path, boolean append) throws IOException; |
| |
| /** |
| * Renames the file denoted by "sourceNode" to the location "targetNode". See {@link |
| * Path#renameTo} for specification. |
| */ |
| public abstract void renameTo(Path sourcePath, Path targetPath) throws IOException; |
| |
| /** |
| * Create a new hard link file at "linkPath" for file at "originalPath". |
| * |
| * @param linkPath The path of the new link file to be created |
| * @param originalPath The path of the original file |
| * @throws IOException if the original file does not exist or the link file already exists |
| */ |
| protected void createHardLink(Path linkPath, Path originalPath) throws IOException { |
| |
| if (!originalPath.exists()) { |
| throw new FileNotFoundException( |
| "File \"" |
| + originalPath.getBaseName() |
| + "\" linked from \"" |
| + linkPath.getBaseName() |
| + "\" does not exist"); |
| } |
| |
| if (linkPath.exists()) { |
| throw new FileAlreadyExistsException( |
| "New link file \"" + linkPath.getBaseName() + "\" already exists"); |
| } |
| |
| createFSDependentHardLink(linkPath, originalPath); |
| } |
| |
| /** |
| * Create a new hard link file at "linkPath" for file at "originalPath". |
| * |
| * @param linkPath The path of the new link file to be created |
| * @param originalPath The path of the original file |
| * @throws IOException if there was an I/O error |
| */ |
| protected abstract void createFSDependentHardLink(Path linkPath, Path originalPath) |
| throws IOException; |
| |
| /** |
| * Prefetch all directories and symlinks within the package |
| * rooted at "path". Enter at most "maxDirs" total directories. |
| * Specializations for high-latency remote filesystems may wish to |
| * implement this in order to warm the filesystem's internal caches. |
| */ |
| protected void prefetchPackageAsync(Path path, int maxDirs) { } |
| } |