fusego/samples/errorfs/error_fs.go

219 lines
4.4 KiB
Go
Raw Normal View History

2015-08-04 01:24:16 +03:00
// Copyright 2015 Google Inc. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package errorfs
import (
"context"
2015-08-04 01:40:38 +03:00
"fmt"
"os"
2015-08-04 01:24:16 +03:00
"reflect"
2015-08-04 01:35:59 +03:00
"sync"
2015-08-04 01:24:16 +03:00
"syscall"
2015-08-04 01:40:38 +03:00
"github.com/jacobsa/fuse/fuseops"
2015-08-04 01:24:16 +03:00
"github.com/jacobsa/fuse/fuseutil"
)
const FooContents = "xxxx"
2015-08-04 01:40:38 +03:00
const fooInodeID = fuseops.RootInodeID + 1
2015-08-04 01:45:51 +03:00
var fooAttrs = fuseops.InodeAttributes{
Nlink: 1,
Size: uint64(len(FooContents)),
Mode: 0444,
}
2015-08-04 01:24:16 +03:00
// A file system whose sole contents are a file named "foo" containing the
// string defined by FooContents.
//
// The file system can be configured to returned canned errors for particular
// operations using the method SetError.
type FS interface {
fuseutil.FileSystem
// Cause the file system to return the supplied error for all future
// operations matching the supplied type.
SetError(t reflect.Type, err syscall.Errno)
}
func New() (FS, error) {
return &errorFS{
2015-08-04 01:42:51 +03:00
errors: make(map[reflect.Type]syscall.Errno),
}, nil
2015-08-04 01:24:16 +03:00
}
2015-08-04 01:35:59 +03:00
type errorFS struct {
fuseutil.NotImplementedFileSystem
mu sync.Mutex
// GUARDED_BY(mu)
2015-08-04 01:42:51 +03:00
errors map[reflect.Type]syscall.Errno
2015-08-04 01:35:59 +03:00
}
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) SetError(t reflect.Type, err syscall.Errno) {
fs.mu.Lock()
defer fs.mu.Unlock()
2015-08-04 01:42:51 +03:00
fs.errors[t] = err
2015-08-04 01:35:59 +03:00
}
2015-08-04 01:40:38 +03:00
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) transformError(op interface{}, err *error) bool {
fs.mu.Lock()
defer fs.mu.Unlock()
2015-08-04 01:42:51 +03:00
cannedErr, ok := fs.errors[reflect.TypeOf(op)]
if ok {
*err = cannedErr
return true
}
return false
2015-08-04 01:40:38 +03:00
}
////////////////////////////////////////////////////////////////////////
// File system methods
////////////////////////////////////////////////////////////////////////
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) GetInodeAttributes(
ctx context.Context,
op *fuseops.GetInodeAttributesOp) error {
var err error
2015-08-04 01:40:38 +03:00
if fs.transformError(op, &err) {
return err
2015-08-04 01:40:38 +03:00
}
// Figure out which inode the request is for.
switch {
case op.Inode == fuseops.RootInodeID:
op.Attributes = fuseops.InodeAttributes{
Mode: os.ModeDir | 0777,
}
case op.Inode == fooInodeID:
2015-08-04 01:45:51 +03:00
op.Attributes = fooAttrs
2015-08-04 01:40:38 +03:00
default:
return fmt.Errorf("Unknown inode: %d", op.Inode)
2015-08-04 01:40:38 +03:00
}
return nil
2015-08-04 01:40:38 +03:00
}
2015-08-04 01:45:51 +03:00
2015-09-09 15:55:39 +03:00
func (fs *errorFS) StatFS(
ctx context.Context,
op *fuseops.StatFSOp) error {
return nil
2015-09-09 15:55:39 +03:00
}
2015-08-04 01:45:51 +03:00
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) LookUpInode(
ctx context.Context,
op *fuseops.LookUpInodeOp) error {
var err error
2015-08-04 01:45:51 +03:00
if fs.transformError(op, &err) {
return err
2015-08-04 01:45:51 +03:00
}
// Is this a known inode?
if !(op.Parent == fuseops.RootInodeID && op.Name == "foo") {
return syscall.ENOENT
2015-08-04 01:45:51 +03:00
}
op.Entry.Child = fooInodeID
op.Entry.Attributes = fooAttrs
return nil
2015-08-04 01:45:51 +03:00
}
2015-08-04 01:48:03 +03:00
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) OpenFile(
ctx context.Context,
op *fuseops.OpenFileOp) error {
var err error
2015-08-04 01:48:03 +03:00
if fs.transformError(op, &err) {
return err
2015-08-04 01:48:03 +03:00
}
if op.Inode != fooInodeID {
return fmt.Errorf("Unsupported inode ID: %d", op.Inode)
2015-08-04 01:48:03 +03:00
}
return nil
2015-08-04 01:48:03 +03:00
}
2015-08-04 02:00:38 +03:00
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) ReadFile(
ctx context.Context,
op *fuseops.ReadFileOp) error {
var err error
2015-08-04 02:00:38 +03:00
if fs.transformError(op, &err) {
return err
2015-08-04 02:00:38 +03:00
}
if op.Inode != fooInodeID || op.Offset != 0 {
return fmt.Errorf("Unexpected request: %#v", op)
2015-08-04 02:00:38 +03:00
}
op.BytesRead = copy(op.Dst, FooContents)
return nil
2015-08-04 02:00:38 +03:00
}
2015-08-04 02:03:22 +03:00
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) OpenDir(
ctx context.Context,
op *fuseops.OpenDirOp) error {
var err error
2015-08-04 02:03:22 +03:00
if fs.transformError(op, &err) {
return err
2015-08-04 02:03:22 +03:00
}
if op.Inode != fuseops.RootInodeID {
return fmt.Errorf("Unsupported inode ID: %d", op.Inode)
2015-08-04 02:03:22 +03:00
}
return nil
2015-08-04 02:03:22 +03:00
}
// LOCKS_EXCLUDED(fs.mu)
func (fs *errorFS) ReadDir(
ctx context.Context,
op *fuseops.ReadDirOp) error {
var err error
2015-08-04 02:03:22 +03:00
if fs.transformError(op, &err) {
return err
2015-08-04 02:03:22 +03:00
}
if op.Inode != fuseops.RootInodeID || op.Offset != 0 {
return fmt.Errorf("Unexpected request: %#v", op)
2015-08-04 02:03:22 +03:00
}
op.BytesRead = fuseutil.WriteDirent(
op.Dst,
fuseutil.Dirent{
Offset: 0,
Inode: fooInodeID,
Name: "foo",
Type: fuseutil.DT_File,
})
return nil
2015-08-04 02:03:22 +03:00
}