This commit is contained in:
AB
2020-06-03 18:44:25 +03:00
commit 77f9604dce
17 changed files with 3142 additions and 0 deletions

1
.gitignore vendored Normal file
View File

@ -0,0 +1 @@
/target

3
.idea/.gitignore generated vendored Normal file
View File

@ -0,0 +1,3 @@
# Default ignored files
/shelf/
/workspace.xml

12
.idea/http-fuse.iml generated Normal file
View File

@ -0,0 +1,12 @@
<?xml version="1.0" encoding="UTF-8"?>
<module type="JAVA_MODULE" version="4">
<component name="NewModuleRootManager" inherit-compiler-output="true">
<exclude-output />
<content url="file://$MODULE_DIR$">
<sourceFolder url="file://$MODULE_DIR$/src" isTestSource="false" />
<excludeFolder url="file://$MODULE_DIR$/target" />
</content>
<orderEntry type="inheritedJdk" />
<orderEntry type="sourceFolder" forTests="false" />
</component>
</module>

6
.idea/misc.xml generated Normal file
View File

@ -0,0 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<project version="4">
<component name="ProjectRootManager" version="2" languageLevel="JDK_14" project-jdk-name="14" project-jdk-type="JavaSDK">
<output url="file://$PROJECT_DIR$/out" />
</component>
</project>

8
.idea/modules.xml generated Normal file
View File

@ -0,0 +1,8 @@
<?xml version="1.0" encoding="UTF-8"?>
<project version="4">
<component name="ProjectModuleManager">
<modules>
<module fileurl="file://$PROJECT_DIR$/.idea/http-fuse.iml" filepath="$PROJECT_DIR$/.idea/http-fuse.iml" />
</modules>
</component>
</project>

16
.idea/runConfigurations/Run_furumi.xml generated Normal file
View File

@ -0,0 +1,16 @@
<component name="ProjectRunConfigurationManager">
<configuration default="false" name="Run furumi" type="CargoCommandRunConfiguration" factoryName="Cargo Command">
<option name="channel" value="STABLE" />
<option name="command" value="run --package furumi --bin furumi -- --conf /etc/mus-fuse.yml" />
<option name="allFeatures" value="false" />
<option name="nocapture" value="false" />
<option name="emulateTerminal" value="false" />
<option name="backtrace" value="SHORT" />
<option name="workingDirectory" value="file://$PROJECT_DIR$" />
<envs />
<method v="2">
<option name="CARGO.BUILD_TASK_PROVIDER" enabled="true" />
<option name="ToolBeforeRunTask" enabled="true" actionId="Tool_External Tools_fusermount -u mnt" />
</method>
</configuration>
</component>

6
.idea/vcs.xml generated Normal file
View File

@ -0,0 +1,6 @@
<?xml version="1.0" encoding="UTF-8"?>
<project version="4">
<component name="VcsDirectoryMappings">
<mapping directory="" vcs="Git" />
</component>
</project>

46
.vscode/launch.json vendored Normal file
View File

@ -0,0 +1,46 @@
{
// Use IntelliSense to learn about possible attributes.
// Hover to view descriptions of existing attributes.
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
"version": "0.2.0",
"configurations": [
{
"type": "lldb",
"env": {
"RUST_BACKTRACE": "1",
},
"request": "launch",
"name": "Debug executable 'furumi'",
"cargo": {
"args": [
"run",
"--",
"--conf",
"/etc/mus-fuse.yml"
],
},
"cwd": "${workspaceFolder}",
"postDebugTask": "Umount FUSE",
"preLaunchTask": "Umount FUSE",
}
{
"type": "lldb",
"request": "launch",
"name": "Debug unit tests in executable 'furumi'",
"cargo": {
"args": [
"test",
"--no-run",
"--bin=furumi",
"--package=furumi"
],
"filter": {
"name": "furumi",
"kind": "bin"
}
},
"args": [],
"cwd": "${workspaceFolder}"
}
],
}

5
.vscode/settings.json vendored Normal file
View File

@ -0,0 +1,5 @@
{
"lldb.displayFormat": "auto",
"lldb.showDisassembly": "never",
"lldb.dereferencePointers": true
}

14
.vscode/tasks.json vendored Normal file
View File

@ -0,0 +1,14 @@
{
// See https://go.microsoft.com/fwlink/?LinkId=733558
// for the documentation about the tasks.json format
"version": "2.0.0",
"tasks": [
{
"label": "Umount FUSE",
"type": "shell",
"command": "fusermount -u mnt",
"group": "build",
"problemMatcher": []
}
]
}

1845
Cargo.lock generated Normal file

File diff suppressed because it is too large Load Diff

40
Cargo.toml Normal file
View File

@ -0,0 +1,40 @@
[package]
name = "furumi"
version = "0.1.0"
authors = ["AB <ultradesu@hexor.ru>"]
edition = "2018"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[dependencies]
polyfuse = "0.3.3"
polyfuse-tokio = "0.2"
tracing-subscriber = "0.2.5"
libc = "0.2.69"
anyhow = "1"
slab = "0.4"
tracing = "0.1"
tracing-futures = "0.2"
futures = "0.3"
futures-intrusive = "0.2"
# config deps
reqwest = { version = "0.10", features = ["json", "blocking"] }
tokio = { version = "0.2", features = ["full"] }
serde = { version = "1.0", features = ["derive"] }
clap = {version = "2.33", features = ["yaml"]}
serde_json = "1.0"
percent-encoding = "2.1"
time = "0.1"
chrono = "0.4"
env_logger = "0.7"
log = { version = "^0.4.5", features = ["std"] }
size_format = "1.0"
base64 = "0.12"
ctrlc = "3.1"
config = "0.9"
[dev-dependencies.tokio]
version = "0.2"
features = [ "full" ]

3
assets/umount.sh Normal file
View File

@ -0,0 +1,3 @@
#!/usr/bin/env bash
fusermount -u "$1" || true

87
src/config.rs Normal file
View File

@ -0,0 +1,87 @@
use clap::{App, Arg};
use std::process;
extern crate chrono;
extern crate config;
#[derive(Default, Debug, Clone, PartialEq)]
pub struct Config {
pub server: String,
pub mountpoint: String,
pub username: Option<String>,
pub password: Option<String>,
pub conf_file: String,
}
pub fn read() -> Config {
// Parse opts and args
let cli_args = App::new(env!("CARGO_PKG_NAME"))
.version(env!("CARGO_PKG_VERSION"))
.author(env!("CARGO_PKG_AUTHORS"))
.about(env!("CARGO_PKG_DESCRIPTION"))
.arg(
Arg::with_name("conf")
.short("c")
.long("conf")
.help("Config file to use")
.takes_value(true)
.required(true),
)
.get_matches();
info!("Logger initialized. Set RUST_LOG=[debug,error,info,warn,trace] Default: info");
info!("Starting {} {}", env!("CARGO_PKG_NAME"), env!("CARGO_PKG_VERSION"));
// Read config file and env vars
let config_file = cli_args.value_of("conf").unwrap();
let mut settings = config::Config::default();
settings = match settings.merge(config::File::with_name(config_file)) {
Ok(conf_content) => {
info!("Using config file {}", config_file);
conf_content.to_owned()
}
Err(e) => {
error!("Can't read config file - {}", e);
process::exit(0x0001);
}
};
let server = match settings.get_str("server") {
Ok(server) => server,
Err(_) => {
error!("Server is not set in config. Set `server` directive.");
process::exit(0x0002);
}
};
let mountpoint = match settings.get_str("mountpoint") {
Ok(mountpoint) => mountpoint,
Err(_) => {
error!("Mountpoint is not set in config. Set `mountpoint` directive.");
process::exit(0x0003);
}
};
let username = match settings.get_str("username") {
Ok(username) => Some(username),
Err(_) => {
None
}
};
let password = match settings.get_str("password") {
Ok(password) => Some(password),
Err(_) => {
None
}
};
if password == None || username == None {
warn!("Insecure server detected. Set `username` and `password` directives to use auth.");
}
Config {
server: server,
username: username,
password: password,
mountpoint: mountpoint,
conf_file: config_file.to_string(),
}
}

945
src/filesystem.rs Normal file
View File

@ -0,0 +1,945 @@
#![allow(clippy::unnecessary_mut_passed)]
#![deny(clippy::unimplemented)]
use crate::config;
use crate::http;
use polyfuse::{
io::{Reader, Writer},
op,
reply::{Collector, Reply, ReplyAttr, ReplyEntry, ReplyOpen, ReplyWrite, ReplyXattr},
Context, DirEntry, FileAttr, Filesystem, Forget, Operation,
};
use slab::Slab;
use std::{
collections::hash_map::{Entry, HashMap},
ffi::{OsStr, OsString},
fmt::Debug,
io,
sync::Arc,
time::Duration,
};
use tokio::sync::Mutex;
use tracing_futures::Instrument;
use std::path::Path;
type Ino = u64;
#[derive(Debug)]
struct INodeTable {
map: HashMap<Ino, Arc<Mutex<INode>>>,
next_ino: Ino,
}
impl INodeTable {
fn new() -> Self {
Self {
map: HashMap::new(),
next_ino: 1, // a
}
}
fn vacant_entry(&mut self) -> VacantEntry<'_> {
let ino = self.next_ino;
VacantEntry { table: self, ino }
}
fn get(&self, ino: Ino) -> Option<Arc<Mutex<INode>>> {
self.map.get(&ino).cloned()
}
fn remove(&mut self, ino: Ino) -> Option<Arc<Mutex<INode>>> {
self.map.remove(&ino)
}
}
#[derive(Debug)]
struct VacantEntry<'a> {
table: &'a mut INodeTable,
ino: u64,
}
impl VacantEntry<'_> {
fn ino(&self) -> Ino {
self.ino
}
fn insert(self, inode: INode) {
let Self { table, ino } = self;
table.map.insert(ino, Arc::new(Mutex::new(inode)));
table.next_ino += 1;
}
}
#[derive(Debug)]
struct INode {
attr: FileAttr,
xattrs: HashMap<OsString, Arc<Vec<u8>>>,
refcount: u64,
links: u64,
kind: INodeKind,
}
#[derive(Debug)]
enum INodeKind {
RegularFile(Vec<u8>),
Directory(Directory),
Symlink(Arc<OsString>),
}
#[derive(Debug, Clone)]
struct Directory {
children: HashMap<OsString, Ino>,
parent: Option<Ino>,
}
impl Directory {
fn collect_entries(&self, attr: &FileAttr) -> Vec<Arc<DirEntry>> {
let mut entries = Vec::with_capacity(self.children.len() + 2);
let mut offset: u64 = 1;
entries.push(Arc::new(DirEntry::dir(".", attr.ino(), offset)));
offset += 1;
entries.push(Arc::new(DirEntry::dir(
"..",
self.parent.unwrap_or_else(|| attr.ino()),
offset,
)));
offset += 1;
for (name, &ino) in &self.children {
entries.push(Arc::new(DirEntry::new(name, ino, offset)));
offset += 1;
}
entries
}
}
#[derive(Debug)]
struct DirHandle {
entries: Vec<Arc<DirEntry>>,
}
#[derive(Debug)]
pub struct MemFS {
inodes: Mutex<INodeTable>,
ttl: Duration,
dir_handles: Mutex<Slab<Arc<Mutex<DirHandle>>>>,
cfg: config::Config,
}
impl MemFS {
pub fn new(cfg: &config::Config) -> Self {
let mut inodes = INodeTable::new();
//let self.cfg = cfg;
//let entries = http::list_directory(&cfg.server, &cfg.username, &cfg.password, "/").await;
inodes.vacant_entry().insert(INode {
attr: {
let mut attr = FileAttr::default();
attr.set_ino(1);
attr.set_nlink(2);
attr.set_mode(libc::S_IFDIR | 0o755);
attr
},
xattrs: HashMap::new(),
refcount: u64::max_value() / 2,
links: u64::max_value() / 2,
kind: INodeKind::Directory(Directory {
children: HashMap::new(),
parent: None,
}),
});
Self {
inodes: Mutex::new(inodes),
dir_handles: Mutex::default(),
ttl: Duration::from_secs(60 * 60 * 24),
cfg: cfg.clone(),
}
}
fn make_entry_reply(&self, ino: Ino, attr: FileAttr) -> ReplyEntry {
let mut reply = ReplyEntry::default();
reply.ino(ino);
reply.attr(attr);
reply.ttl_entry(self.ttl);
reply
}
async fn lookup_inode(&self, parent: Ino, name: &OsStr) -> io::Result<ReplyEntry> {
// warn!("==> lookup_inode: parent: {:?}, name: {:?}", parent, name);
let inodes = self.inodes.lock().await;
let parent = inodes.get(parent).ok_or_else(no_entry)?;
let parent = parent.lock().await;
let parent = match parent.kind {
INodeKind::Directory(ref dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
let child_ino = parent.children.get(&*name).copied().ok_or_else(no_entry)?;
let child = inodes.get(child_ino).unwrap_or_else(|| unreachable!());
let mut child = child.lock().await;
child.refcount += 1;
// warn!("==> lookup_inode: child_ino: {:?}, child.attr: {:?}", child_ino, child.attr);
Ok(self.make_entry_reply(child_ino, child.attr))
}
async fn make_node<F>(&self, parent: Ino, name: &OsStr, f: F) -> io::Result<ReplyEntry>
where
F: FnOnce(&VacantEntry<'_>) -> INode,
{
// debug!("make_node: parent: {:?}, name: {:?}", parent, name);
let mut inodes = self.inodes.lock().await;
let parent = inodes.get(parent).ok_or_else(no_entry)?;
let mut parent = parent.lock().await;
let parent = match parent.kind {
INodeKind::Directory(ref mut dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
match parent.children.entry(name.into()) {
Entry::Occupied(..) => Err(io::Error::from_raw_os_error(libc::EEXIST)),
Entry::Vacant(map_entry) => {
let inode_entry = inodes.vacant_entry();
let inode = f(&inode_entry);
let reply = self.make_entry_reply(inode_entry.ino(), inode.attr);
map_entry.insert(inode_entry.ino());
inode_entry.insert(inode);
Ok(reply)
}
}
}
async fn link_node(&self, ino: u64, newparent: Ino, newname: &OsStr) -> io::Result<ReplyEntry> {
{
let inodes = self.inodes.lock().await;
let inode = inodes.get(ino).ok_or_else(no_entry)?;
let newparent = inodes.get(newparent).ok_or_else(no_entry)?;
let mut newparent = newparent.lock().await;
let newparent = match newparent.kind {
INodeKind::Directory(ref mut dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
match newparent.children.entry(newname.into()) {
Entry::Occupied(..) => return Err(io::Error::from_raw_os_error(libc::EEXIST)),
Entry::Vacant(entry) => {
entry.insert(ino);
let mut inode = inode.lock().await;
let inode = &mut *inode;
inode.links += 1;
inode.attr.set_nlink(inode.attr.nlink() + 1);
}
}
}
self.lookup_inode(newparent, newname).await
}
async fn unlink_node(&self, parent: Ino, name: &OsStr) -> io::Result<()> {
let inodes = self.inodes.lock().await;
let parent = inodes.get(parent).ok_or_else(no_entry)?;
let mut parent = parent.lock().await;
let parent = match parent.kind {
INodeKind::Directory(ref mut dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
let &ino = parent.children.get(name).ok_or_else(no_entry)?;
let inode = inodes.get(ino).unwrap_or_else(|| unreachable!());
let mut inode = inode.lock().await;
let inode = &mut *inode;
match inode.kind {
INodeKind::Directory(ref dir) if !dir.children.is_empty() => {
return Err(io::Error::from_raw_os_error(libc::ENOTEMPTY));
}
_ => (),
}
parent
.children
.remove(name)
.unwrap_or_else(|| unreachable!());
inode.links = inode.links.saturating_sub(1);
inode.attr.set_nlink(inode.attr.nlink().saturating_sub(1));
Ok(())
}
async fn rename_node(&self, parent: Ino, name: &OsStr, newname: &OsStr) -> io::Result<()> {
let inodes = self.inodes.lock().await;
let parent = inodes.get(parent).ok_or_else(no_entry)?;
let mut parent = parent.lock().await;
let parent = match parent.kind {
INodeKind::Directory(ref mut dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
let &ino = parent.children.get(name).ok_or_else(no_entry)?;
match parent.children.entry(newname.into()) {
Entry::Occupied(..) => Err(io::Error::from_raw_os_error(libc::EEXIST)),
Entry::Vacant(entry) => {
entry.insert(ino);
parent
.children
.remove(name)
.unwrap_or_else(|| unreachable!());
Ok(())
}
}
}
async fn graft_node(
&self,
parent: Ino,
name: &OsStr,
newparent: Ino,
newname: &OsStr,
) -> io::Result<()> {
debug_assert_ne!(parent, newparent);
let inodes = self.inodes.lock().await;
let parent = inodes.get(parent).ok_or_else(no_entry)?;
let mut parent = parent.lock().await;
let parent = match parent.kind {
INodeKind::Directory(ref mut dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
let newparent = inodes.get(newparent).ok_or_else(no_entry)?;
let mut newparent = newparent.lock().await;
let newparent = match newparent.kind {
INodeKind::Directory(ref mut dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
match newparent.children.entry(newname.into()) {
Entry::Occupied(..) => Err(io::Error::from_raw_os_error(libc::EEXIST)),
Entry::Vacant(entry) => {
let ino = parent.children.remove(name).ok_or_else(no_entry)?;
entry.insert(ino);
Ok(())
}
}
}
async fn do_lookup(&self, op: &op::Lookup<'_>) -> io::Result<ReplyEntry> {
// warn!("do_lookup: op: {:?}", op);
let gg = self.lookup_inode(op.parent(), op.name()).await;
// warn!("===> do_lookup: lookup_inode: {:?}", gg);
gg
}
async fn do_forget(&self, forgets: &[Forget]) {
let mut inodes = self.inodes.lock().await;
for forget in forgets {
if let Some(inode) = inodes.get(forget.ino()) {
let mut inode = inode.lock().await;
inode.refcount = inode.refcount.saturating_sub(forget.nlookup());
if inode.refcount == 0 && inode.links == 0 {
inodes.remove(forget.ino());
}
}
}
}
async fn do_getattr(&self, op: &op::Getattr<'_>) -> io::Result<ReplyAttr> {
// warn!("do_getattr: op: {:?}", op);
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
let mut reply = ReplyAttr::new(inode.attr);
reply.ttl_attr(self.ttl);
Ok(reply)
}
async fn do_setattr(&self, op: &op::Setattr<'_>) -> io::Result<ReplyAttr> {
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let mut inode = inode.lock().await;
if let Some(mode) = op.mode() {
inode.attr.set_mode(mode);
}
if let Some(uid) = op.uid() {
inode.attr.set_uid(uid);
}
if let Some(gid) = op.gid() {
inode.attr.set_gid(gid);
}
if let Some(size) = op.size() {
inode.attr.set_size(size);
}
if let Some(atime) = op.atime() {
inode.attr.set_atime(atime);
}
if let Some(mtime) = op.mtime() {
inode.attr.set_mtime(mtime);
}
if let Some(ctime) = op.ctime() {
inode.attr.set_ctime(ctime);
}
let mut reply = ReplyAttr::new(inode.attr);
reply.ttl_attr(self.ttl);
Ok(reply)
}
async fn do_readlink(&self, op: &op::Readlink<'_>) -> io::Result<Arc<OsString>> {
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
match inode.kind {
INodeKind::Symlink(ref link) => Ok(link.clone()),
_ => Err(io::Error::from_raw_os_error(libc::EINVAL)),
}
}
pub async fn fetch_remote(&self, path: &Path, parent: u64) -> io::Result<()> {
let remote_entries = http::list_directory(
&self.cfg.server, &self.cfg.username, &self.cfg.password, path).await.unwrap();
for r_entry in remote_entries.iter(){
match &r_entry.r#type {
Some(r#type) => {
match r#type.as_str() {
"file" => {
let f_name = r_entry.name.as_ref().unwrap();
self.make_node(
parent, OsStr::new(f_name.as_str()), |entry| {
INode {
attr: {
// debug!("Adding file {:?} - {:?}", f_name, entry);
let mut attr = FileAttr::default();
attr.set_ino(entry.ino());
attr.set_mtime(r_entry.parse_rfc2822());
attr.set_size(r_entry.size.unwrap());
attr.set_nlink(1);
attr.set_mode(libc::S_IFREG | 0o444);
attr
},
xattrs: HashMap::new(),
refcount: 1,
links: 1,
kind: INodeKind::RegularFile(vec![]),
}
})
.await;
}
"directory" => {
let f_name = r_entry.name.as_ref().unwrap();
self.make_node(
parent, OsStr::new(f_name.as_str()), |entry| {
INode {
attr: {
// debug!("Adding directory {:?} - {:?}", f_name, entry);
let mut attr = FileAttr::default();
attr.set_ino(entry.ino());
attr.set_mtime(r_entry.parse_rfc2822());
attr.set_nlink(1);
attr.set_mode(libc::S_IFDIR | 0o755);
attr
},
xattrs: HashMap::new(),
refcount: u64::max_value() / 2,
links: u64::max_value() / 2,
kind: INodeKind::Directory(Directory {
children: HashMap::new(),
parent: Some(parent),
}),
}
}).await;
}
&_ => {}
}
}
None => {}
}
}
Ok(())
}
async fn full_path(&self, inode: u64) {
}
async fn do_opendir(&self, op: &op::Opendir<'_>) -> io::Result<ReplyOpen> {
// debug!("do_opendir: op: {:?}", op);
let mut dirs = self.dir_handles.lock().await;
info!("dirs: {:?}", dirs);
for x in dirs {
info!("x: {:?}", x);
}
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
let children = match &inode.kind {
INodeKind::Directory(dir) => {
match dir.parent {
Some(parent) => {
let par_inode = inodes.get(parent).ok_or_else(no_entry)?;
let par_inode = par_inode.lock().await;
let _uri = match &par_inode.kind {
INodeKind::Directory(dir) => {
dir.children.clone()
}
_ => HashMap::new()
};
_uri
}
None => HashMap::new()
}
}
_ => {HashMap::new()}
};
let mut uri = Path::new("/");
for (name, inode) in &children {
if inode == &op.ino() {
uri = Path::new(name.as_os_str());
}
}
drop(dirs);
drop(inodes);
drop(inode);
self.fetch_remote(uri, op.ino()).await;
let mut dirs = self.dir_handles.lock().await;
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
if inode.attr.nlink() == 0 {
return Err(no_entry());
}
let dir = match inode.kind {
INodeKind::Directory(ref dir) => dir,
_ => return Err(io::Error::from_raw_os_error(libc::ENOTDIR)),
};
let key = dirs.insert(Arc::new(Mutex::new(DirHandle {
entries: dir.collect_entries(&inode.attr),
})));
Ok(ReplyOpen::new(key as u64))
}
async fn do_readdir(&self, op: &op::Readdir<'_>) -> io::Result<impl Reply + Debug> {
// warn!("do_readdir: op: {:?}", op);
let dirs = self.dir_handles.lock().await;
let dir = dirs
.get(op.fh() as usize)
.cloned()
.ok_or_else(unknown_error)?;
let dir = dir.lock().await;
let mut total_len = 0;
let entries: Vec<_> = dir
.entries
.iter()
.skip(op.offset() as usize)
.take_while(|entry| {
let entry: &DirEntry = &*entry;
total_len += entry.as_ref().len() as u32;
total_len < op.size()
})
.cloned()
.collect();
Ok(entries)
}
async fn do_releasedir(&self, op: &op::Releasedir<'_>) -> io::Result<()> {
let mut dirs = self.dir_handles.lock().await;
let dir = dirs.remove(op.fh() as usize);
drop(dir);
Ok(())
}
async fn do_mknod(&self, op: &op::Mknod<'_>) -> io::Result<ReplyEntry> {
warn!("do_mknod: op: {:?}", op);
match op.mode() & libc::S_IFMT {
libc::S_IFREG => (),
_ => return Err(io::Error::from_raw_os_error(libc::ENOTSUP)),
}
self.make_node(op.parent(), op.name(), |entry| INode {
attr: {
let mut attr = FileAttr::default();
attr.set_ino(entry.ino());
attr.set_nlink(1);
attr.set_mode(op.mode());
attr
},
xattrs: HashMap::new(),
refcount: 1,
links: 1,
kind: INodeKind::RegularFile(vec![]),
})
.await
}
async fn do_mkdir(&self, op: &op::Mkdir<'_>) -> io::Result<ReplyEntry> {
// warn!("do_mkdir: op: {:?}", op);
self.make_node(op.parent(), op.name(), |entry| INode {
attr: {
let mut attr = FileAttr::default();
attr.set_ino(entry.ino());
attr.set_nlink(2);
attr.set_mode(op.mode() | libc::S_IFDIR);
attr
},
xattrs: HashMap::new(),
refcount: 1,
links: 1,
kind: INodeKind::Directory(Directory {
children: HashMap::new(),
parent: Some(op.parent()),
}),
})
.await
}
async fn do_symlink(&self, op: &op::Symlink<'_>) -> io::Result<ReplyEntry> {
self.make_node(op.parent(), op.name(), |entry| INode {
attr: {
let mut attr = FileAttr::default();
attr.set_ino(entry.ino());
attr.set_nlink(1);
attr.set_mode(libc::S_IFLNK | 0o777);
attr
},
xattrs: HashMap::new(),
refcount: 1,
links: 1,
kind: INodeKind::Symlink(Arc::new(op.link().into())),
})
.await
}
async fn do_link(&self, op: &op::Link<'_>) -> io::Result<ReplyEntry> {
self.link_node(op.ino(), op.newparent(), op.newname()).await
}
async fn do_unlink(&self, op: &op::Unlink<'_>) -> io::Result<()> {
self.unlink_node(op.parent(), op.name()).await
}
async fn do_rmdir(&self, op: &op::Rmdir<'_>) -> io::Result<()> {
self.unlink_node(op.parent(), op.name()).await
}
async fn do_rename(&self, op: &op::Rename<'_>) -> io::Result<()> {
if op.flags() != 0 {
// TODO: handle RENAME_NOREPLACE and RENAME_EXCHANGE.
return Err(io::Error::from_raw_os_error(libc::EINVAL));
}
match (op.parent(), op.newparent()) {
(parent, newparent) if parent == newparent => {
self.rename_node(parent, op.name(), op.newname()).await
}
(parent, newparent) => {
self.graft_node(parent, op.name(), newparent, op.newname())
.await
}
}
}
async fn do_getxattr(&self, op: &op::Getxattr<'_>) -> io::Result<impl Reply + Debug> {
// warn!("do_getxattr: op: {:?}", op);
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
let value = inode
.xattrs
.get(op.name())
.ok_or_else(|| io::Error::from_raw_os_error(libc::ENODATA))?;
match op.size() {
0 => Ok(Either::Left(ReplyXattr::new(value.len() as u32))),
size => {
if value.len() as u32 > size {
return Err(io::Error::from_raw_os_error(libc::ERANGE));
}
Ok(Either::Right(value.clone()))
}
}
}
async fn do_setxattr(&self, op: &op::Setxattr<'_>) -> io::Result<()> {
// warn!("do_setxattr: op: {:?}", op);
let create = op.flags() as i32 & libc::XATTR_CREATE != 0;
let replace = op.flags() as i32 & libc::XATTR_REPLACE != 0;
if create && replace {
return Err(io::Error::from_raw_os_error(libc::EINVAL));
}
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let mut inode = inode.lock().await;
match inode.xattrs.entry(op.name().into()) {
Entry::Occupied(..) if create => Err(io::Error::from_raw_os_error(libc::EEXIST)),
Entry::Occupied(entry) => {
let value = Arc::make_mut(entry.into_mut());
*value = op.value().into();
Ok(())
}
Entry::Vacant(..) if replace => Err(io::Error::from_raw_os_error(libc::ENODATA)),
Entry::Vacant(entry) => {
if create {
entry.insert(Arc::default());
} else {
entry.insert(Arc::new(op.value().into()));
}
Ok(())
}
}
}
async fn do_listxattr(&self, op: &op::Listxattr<'_>) -> io::Result<impl Reply + Debug> {
// warn!("do_listxattr: op: {:?}", op);
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
match op.size() {
0 => {
let total_len = inode.xattrs.keys().map(|name| name.len() as u32 + 1).sum();
Ok(Either::Left(ReplyXattr::new(total_len)))
}
size => {
let mut total_len = 0;
let names = inode.xattrs.keys().fold(OsString::new(), |mut acc, name| {
acc.push(name);
acc.push("\0");
total_len += name.len() as u32 + 1;
acc
});
if total_len > size {
return Err(io::Error::from_raw_os_error(libc::ERANGE));
}
Ok(Either::Right(names))
}
}
}
async fn do_removexattr(&self, op: &op::Removexattr<'_>) -> io::Result<()> {
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let mut inode = inode.lock().await;
match inode.xattrs.entry(op.name().into()) {
Entry::Occupied(entry) => {
entry.remove();
Ok(())
}
Entry::Vacant(..) => Err(io::Error::from_raw_os_error(libc::ENODATA)),
}
}
async fn do_read(&self, op: &op::Read<'_>) -> io::Result<impl Reply + Debug> {
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let inode = inode.lock().await;
let content = match inode.kind {
INodeKind::RegularFile(ref content) => content,
_ => return Err(io::Error::from_raw_os_error(libc::EINVAL)),
};
let offset = op.offset() as usize;
let size = op.size() as usize;
let content = content.get(offset..).unwrap_or(&[]);
let content = &content[..std::cmp::min(content.len(), size)];
Ok(content.to_vec())
}
async fn do_write<R: ?Sized>(
&self,
op: &op::Write<'_>,
reader: &mut R,
) -> io::Result<ReplyWrite>
where
R: Reader + Unpin,
{
let inodes = self.inodes.lock().await;
let inode = inodes.get(op.ino()).ok_or_else(no_entry)?;
let mut inode = inode.lock().await;
let inode = &mut *inode;
let content = match inode.kind {
INodeKind::RegularFile(ref mut content) => content,
_ => return Err(io::Error::from_raw_os_error(libc::EINVAL)),
};
let offset = op.offset() as usize;
let size = op.size() as usize;
content.resize(offset + size, 0);
use futures::io::AsyncReadExt;
reader
.read_exact(&mut content[offset..offset + size])
.await?;
inode.attr.set_size(content.len() as u64);
Ok(ReplyWrite::new(op.size()))
}
}
#[polyfuse::async_trait]
impl Filesystem for MemFS {
#[allow(clippy::cognitive_complexity)]
async fn call<'a, 'cx, T: ?Sized>(
&'a self,
cx: &'a mut Context<'cx, T>,
op: Operation<'cx>,
) -> io::Result<()>
where
T: Reader + Writer + Send + Unpin,
{
let span = tracing::debug_span!("MemFS::call", unique = cx.unique());
span.in_scope(|| tracing::debug!(?op));
macro_rules! try_reply {
($e:expr) => {
match ($e).instrument(span.clone()).await {
Ok(reply) => {
span.in_scope(|| tracing::debug!(reply=?reply));
cx.reply(reply).await
}
Err(err) => {
let errno = err.raw_os_error().unwrap_or(libc::EIO);
span.in_scope(|| tracing::debug!(errno=errno));
cx.reply_err(errno).await
}
}
};
}
match op {
Operation::Lookup(op) => try_reply!(self.do_lookup(&op)),
Operation::Forget(forgets) => {
self.do_forget(forgets.as_ref()).await;
Ok(())
}
Operation::Getattr(op) => try_reply!(self.do_getattr(&op)),
Operation::Setattr(op) => try_reply!(self.do_setattr(&op)),
Operation::Readlink(op) => try_reply!(self.do_readlink(&op)),
Operation::Opendir(op) => try_reply!(self.do_opendir(&op)),
Operation::Readdir(op) => try_reply!(self.do_readdir(&op)),
Operation::Releasedir(op) => try_reply!(self.do_releasedir(&op)),
Operation::Mknod(op) => try_reply!(self.do_mknod(&op)),
Operation::Mkdir(op) => try_reply!(self.do_mkdir(&op)),
Operation::Symlink(op) => try_reply!(self.do_symlink(&op)),
Operation::Unlink(op) => try_reply!(self.do_unlink(&op)),
Operation::Rmdir(op) => try_reply!(self.do_rmdir(&op)),
Operation::Link(op) => try_reply!(self.do_link(&op)),
Operation::Rename(op) => try_reply!(self.do_rename(&op)),
Operation::Getxattr(op) => try_reply!(self.do_getxattr(&op)),
Operation::Setxattr(op) => try_reply!(self.do_setxattr(&op)),
Operation::Listxattr(op) => try_reply!(self.do_listxattr(&op)),
Operation::Removexattr(op) => try_reply!(self.do_removexattr(&op)),
Operation::Read(op) => try_reply!(self.do_read(&op)),
Operation::Write(op) => {
let res = self
.do_write(&op, &mut cx.reader())
.instrument(span.clone())
.await;
try_reply!(async { res })
}
_ => {
span.in_scope(|| tracing::debug!("NOSYS"));
Ok(())
}
}
}
}
fn no_entry() -> io::Error {
io::Error::from_raw_os_error(libc::ENOENT)
}
fn unknown_error() -> io::Error {
io::Error::from_raw_os_error(libc::EIO)
}
// FIXME: use either crate.
#[derive(Debug)]
enum Either<L, R> {
Left(L),
Right(R),
}
impl<L, R> Reply for Either<L, R>
where
L: Reply,
R: Reply,
{
#[inline]
fn collect_bytes<'a, C: ?Sized>(&'a self, collector: &mut C)
where
C: Collector<'a>,
{
match self {
Either::Left(l) => l.collect_bytes(collector),
Either::Right(r) => r.collect_bytes(collector),
}
}
}

69
src/http.rs Normal file
View File

@ -0,0 +1,69 @@
extern crate base64;
use reqwest::{blocking::Client, header::CONTENT_LENGTH};
use serde::Deserialize;
use std::{
collections::{BTreeMap, HashMap, HashSet},
env,
ffi::OsStr,
fmt,
path::Path,
process,
thread::sleep,
time::{Duration,SystemTime},
};
#[derive(Default, Debug, Clone, PartialEq, Deserialize)]
pub struct RemoteEntry {
pub name: Option<String>,
pub r#type: Option<String>,
pub mtime: Option<String>,
pub size: Option<u64>,
}
impl RemoteEntry{
pub fn parse_rfc2822(&self) -> SystemTime{
let rfc2822 = DateTime::parse_from_rfc2822(&self.mtime.as_ref().unwrap()).unwrap();
SystemTime::from(rfc2822)
}
}
use chrono::{DateTime, NaiveDate, NaiveDateTime, NaiveTime};
use chrono::format::ParseError;
pub async fn list_directory(
server: &std::string::String,
username: &Option<String>,
password: &Option<String>,
path: &Path) ->
Result<Vec<RemoteEntry>, reqwest::Error> {
info!("Fetching path '{}{}'", server, path.display());
let client = reqwest::Client::new();
let http_auth = match username {
Some(username) => {
// info!("Using Basic Auth");
let mut _buf = String::new();
_buf.push_str(
format!(
"{}:{}",
username,
password.as_ref().unwrap()
).as_str()
);
base64::encode(_buf)
}
None => {String::new()}
};
//info!("AUTH: {:?}", http_auth);
let resp = client
.get(format!("{}/{}", server, path.display()).as_str())
.header("Authorization", format!("Basic {}", http_auth))
.send()
.await?
.json::<Vec<RemoteEntry>>()
.await?;
info!("Found {} entries into '{}'", resp.len(), path.display());
Ok(resp)
}

36
src/main.rs Normal file
View File

@ -0,0 +1,36 @@
use std::path::PathBuf;
#[macro_use]
extern crate log;
use env_logger::Env;
use std::{process,path::Path};
mod config;
mod filesystem;
mod http;
#[tokio::main]
async fn main() -> Result<(), std::io::Error> {
env_logger::from_env(Env::default().default_filter_or("info")).init();
let cfg = config::read();
//let http::list_directory(&cfg.server, &cfg.username, &cfg.password, "/").await;
warn!("{:?}", cfg);
//let mut args = pico_args::Arguments::from_env();
let mountpoint: PathBuf = PathBuf::from(&cfg.mountpoint);
if !mountpoint.is_dir() {
error!("The mountpoint must be a directory");
process::exit(0x0004);
}
let memfs = filesystem::MemFS::new(&cfg);
memfs.fetch_remote(Path::new("/"), 1).await;
polyfuse_tokio::mount(memfs, mountpoint, &[]).await?;
Ok(())
}
/*
Mkdir { parent: 1, name: "123", mode: 493, umask: 18 }
Mknod { parent: 1, name: "123233", mode: 33188, rdev: 0, umask: 18 }
*/