Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
R
redoxfs
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
James Matlik
redoxfs
Commits
25fe6d38
Commit
25fe6d38
authored
8 years ago
by
Jeremy Soller
Browse files
Options
Downloads
Patches
Plain Diff
Implement O_DIRECTORY
parent
dcaf5c76
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
scheme/scheme.rs
+42
-73
42 additions, 73 deletions
scheme/scheme.rs
with
42 additions
and
73 deletions
scheme/scheme.rs
+
42
−
73
View file @
25fe6d38
...
...
@@ -9,7 +9,7 @@ use std::sync::atomic::{AtomicUsize, Ordering};
use
syscall
::
data
::{
Stat
,
StatVfs
};
use
syscall
::
error
::{
Error
,
Result
,
EACCES
,
EEXIST
,
EISDIR
,
ENOTDIR
,
EPERM
,
ENOENT
,
EBADF
};
use
syscall
::
flag
::{
O_CREAT
,
O_TRUNC
,
O_ACCMODE
,
O_RDONLY
,
O_WRONLY
,
O_RDWR
,
MODE_PERM
};
use
syscall
::
flag
::{
O_CREAT
,
O_DIRECTORY
,
O_STAT
,
O_EXCL
,
O_TRUNC
,
O_ACCMODE
,
O_RDONLY
,
O_WRONLY
,
O_RDWR
,
MODE_PERM
};
use
syscall
::
scheme
::
Scheme
;
pub
struct
FileScheme
{
...
...
@@ -51,31 +51,46 @@ impl Scheme for FileScheme {
}
let
resource
:
Box
<
Resource
>
=
match
node_result
{
Ok
(
node
)
=>
if
node
.1
.is_dir
()
{
if
flags
&
O_ACCMODE
!=
O_RDONLY
{
// println!("dir not opened with O_RDONLY");
return
Err
(
Error
::
new
(
EACCES
));
Ok
(
node
)
=>
if
flags
&
(
O_CREAT
|
O_EXCL
)
==
O_CREAT
|
O_EXCL
{
return
Err
(
Error
::
new
(
EEXIST
));
}
else
if
node
.1
.is_dir
()
{
if
flags
&
O_STAT
!=
O_STAT
&&
flags
&
O_DIRECTORY
!=
O_DIRECTORY
{
// println!("{:X} & {:X}: EISDIR {}", flags, O_DIRECTORY, path);
return
Err
(
Error
::
new
(
EISDIR
));
}
if
!
node
.1
.permission
(
uid
,
gid
,
Node
::
MODE_READ
)
{
// println!("dir not readable {:o}", node.1.mode);
return
Err
(
Error
::
new
(
EACCES
));
}
if
flags
&
O_ACCMODE
==
O_RDONLY
{
if
!
node
.1
.permission
(
uid
,
gid
,
Node
::
MODE_READ
)
{
// println!("dir not readable {:o}", node.1.mode);
return
Err
(
Error
::
new
(
EACCES
));
}
let
mut
data
=
Vec
::
new
();
let
mut
children
=
Vec
::
new
();
try
!
(
fs
.child_nodes
(
&
mut
children
,
node
.0
));
for
child
in
children
.iter
()
{
if
let
Ok
(
name
)
=
child
.1
.name
()
{
if
!
data
.is_empty
()
{
data
.push
(
b'\n'
);
let
mut
children
=
Vec
::
new
();
try
!
(
fs
.child_nodes
(
&
mut
children
,
node
.0
));
let
mut
data
=
Vec
::
new
();
for
child
in
children
.iter
()
{
if
let
Ok
(
name
)
=
child
.1
.name
()
{
if
!
data
.is_empty
()
{
data
.push
(
b'\n'
);
}
data
.extend_from_slice
(
&
name
.as_bytes
());
}
data
.extend_from_slice
(
&
name
.as_bytes
());
}
}
Box
::
new
(
DirResource
::
new
(
path
.to_string
(),
node
.0
,
data
))
Box
::
new
(
DirResource
::
new
(
path
.to_string
(),
node
.0
,
data
))
}
else
if
flags
&
O_STAT
==
O_STAT
{
Box
::
new
(
DirResource
::
new
(
path
.to_string
(),
node
.0
,
Vec
::
new
()))
}
else
{
// println!("dir not opened with O_RDONLY");
return
Err
(
Error
::
new
(
EACCES
));
}
}
else
{
if
flags
&
O_DIRECTORY
==
O_DIRECTORY
{
// println!("{:X} & {:X}: ENOTDIR {}", flags, O_DIRECTORY, path);
return
Err
(
Error
::
new
(
ENOTDIR
));
}
if
(
flags
&
O_ACCMODE
==
O_RDONLY
||
flags
&
O_ACCMODE
==
O_RDWR
)
&&
!
node
.1
.permission
(
uid
,
gid
,
Node
::
MODE_READ
)
{
// println!("file not readable {:o}", node.1.mode);
return
Err
(
Error
::
new
(
EACCES
));
...
...
@@ -111,7 +126,9 @@ impl Scheme for FileScheme {
return
Err
(
Error
::
new
(
EACCES
));
}
let
mut
node
=
try
!
(
fs
.create_node
(
Node
::
MODE_FILE
|
(
flags
as
u16
&
Node
::
MODE_PERM
),
&
last_part
,
parent
.0
));
let
dir
=
flags
&
O_DIRECTORY
==
O_DIRECTORY
;
let
mut
node
=
try
!
(
fs
.create_node
(
if
dir
{
Node
::
MODE_DIR
}
else
{
Node
::
MODE_FILE
}
|
(
flags
as
u16
&
Node
::
MODE_PERM
),
&
last_part
,
parent
.0
));
node
.1
.uid
=
uid
;
node
.1
.gid
=
gid
;
try
!
(
fs
.write_at
(
node
.0
,
&
node
.1
));
...
...
@@ -126,7 +143,11 @@ impl Scheme for FileScheme {
return
Err
(
Error
::
new
(
EACCES
));
}
Box
::
new
(
FileResource
::
new
(
path
.to_string
(),
node
.0
,
flags
))
if
dir
{
Box
::
new
(
DirResource
::
new
(
path
.to_string
(),
node
.0
,
Vec
::
new
()))
}
else
{
Box
::
new
(
FileResource
::
new
(
path
.to_string
(),
node
.0
,
flags
))
}
}
else
{
return
Err
(
Error
::
new
(
EPERM
));
}
...
...
@@ -144,58 +165,6 @@ impl Scheme for FileScheme {
Ok
(
id
)
}
fn
mkdir
(
&
self
,
url
:
&
[
u8
],
mode
:
u16
,
uid
:
u32
,
gid
:
u32
)
->
Result
<
usize
>
{
let
path
=
str
::
from_utf8
(
url
)
.unwrap_or
(
""
)
.trim_matches
(
'/'
);
// println!("Mkdir '{}'", path);
let
mut
fs
=
self
.fs
.borrow_mut
();
let
mut
nodes
=
Vec
::
new
();
let
node_result
=
fs
.path_nodes
(
path
,
&
mut
nodes
);
for
node
in
nodes
.iter
()
{
if
!
node
.1
.permission
(
uid
,
gid
,
Node
::
MODE_EXEC
)
{
// println!("dir not executable {:o}", node.1.mode);
return
Err
(
Error
::
new
(
EACCES
));
}
if
!
node
.1
.is_dir
()
{
return
Err
(
Error
::
new
(
ENOTDIR
));
}
}
match
node_result
{
Ok
(
_node
)
=>
Err
(
Error
::
new
(
EEXIST
)),
Err
(
err
)
=>
if
err
.errno
==
ENOENT
{
let
mut
last_part
=
String
::
new
();
for
part
in
path
.split
(
'/'
)
{
if
!
part
.is_empty
()
{
last_part
=
part
.to_owned
();
}
}
if
!
last_part
.is_empty
()
{
if
let
Some
(
parent
)
=
nodes
.last
()
{
if
!
parent
.1
.permission
(
uid
,
gid
,
Node
::
MODE_WRITE
)
{
// println!("dir not writable {:o}", parent.1.mode);
return
Err
(
Error
::
new
(
EACCES
));
}
let
mut
node
=
try
!
(
fs
.create_node
(
Node
::
MODE_DIR
|
(
mode
&
Node
::
MODE_PERM
),
&
last_part
,
parent
.0
));
node
.1
.uid
=
uid
;
node
.1
.gid
=
gid
;
try
!
(
fs
.write_at
(
node
.0
,
&
node
.1
));
Ok
(
0
)
}
else
{
Err
(
Error
::
new
(
EPERM
))
}
}
else
{
Err
(
Error
::
new
(
EPERM
))
}
}
else
{
Err
(
err
)
}
}
}
fn
chmod
(
&
self
,
url
:
&
[
u8
],
mode
:
u16
,
uid
:
u32
,
gid
:
u32
)
->
Result
<
usize
>
{
let
path
=
str
::
from_utf8
(
url
)
.unwrap_or
(
""
)
.trim_matches
(
'/'
);
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment