mirror of
https://github.com/octoleo/syncthing.git
synced 2024-11-17 18:45:13 +00:00
717 lines
21 KiB
Go
717 lines
21 KiB
Go
// Copyright (C) 2014 The Syncthing Authors.
|
|
//
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
// You can obtain one at https://mozilla.org/MPL/2.0/.
|
|
|
|
package scanner
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"path/filepath"
|
|
"strings"
|
|
"sync/atomic"
|
|
"time"
|
|
"unicode/utf8"
|
|
|
|
metrics "github.com/rcrowley/go-metrics"
|
|
"github.com/syncthing/syncthing/lib/build"
|
|
"github.com/syncthing/syncthing/lib/events"
|
|
"github.com/syncthing/syncthing/lib/fs"
|
|
"github.com/syncthing/syncthing/lib/ignore"
|
|
"github.com/syncthing/syncthing/lib/osutil"
|
|
"github.com/syncthing/syncthing/lib/protocol"
|
|
"golang.org/x/text/unicode/norm"
|
|
)
|
|
|
|
type Config struct {
|
|
// Folder for which the walker has been created
|
|
Folder string
|
|
// Limit walking to these paths within Dir, or no limit if Sub is empty
|
|
Subs []string
|
|
// If Matcher is not nil, it is used to identify files to ignore which were specified by the user.
|
|
Matcher *ignore.Matcher
|
|
// Number of hours to keep temporary files for
|
|
TempLifetime time.Duration
|
|
// If CurrentFiler is not nil, it is queried for the current file before rescanning.
|
|
CurrentFiler CurrentFiler
|
|
// The Filesystem provides an abstraction on top of the actual filesystem.
|
|
Filesystem fs.Filesystem
|
|
// If IgnorePerms is true, changes to permission bits will not be
|
|
// detected.
|
|
IgnorePerms bool
|
|
// When AutoNormalize is set, file names that are in UTF8 but incorrect
|
|
// normalization form will be corrected.
|
|
AutoNormalize bool
|
|
// Number of routines to use for hashing
|
|
Hashers int
|
|
// Our vector clock id
|
|
ShortID protocol.ShortID
|
|
// Optional progress tick interval which defines how often FolderScanProgress
|
|
// events are emitted. Negative number means disabled.
|
|
ProgressTickIntervalS int
|
|
// Local flags to set on scanned files
|
|
LocalFlags uint32
|
|
// Modification time is to be considered unchanged if the difference is lower.
|
|
ModTimeWindow time.Duration
|
|
// Event logger to which the scan progress events are sent
|
|
EventLogger events.Logger
|
|
// If ScanOwnership is true, we pick up ownership information on files while scanning.
|
|
ScanOwnership bool
|
|
// If ScanXattrs is true, we pick up extended attributes on files while scanning.
|
|
ScanXattrs bool
|
|
// Filter for extended attributes
|
|
XattrFilter XattrFilter
|
|
}
|
|
|
|
type CurrentFiler interface {
|
|
// CurrentFile returns the file as seen at last scan.
|
|
CurrentFile(name string) (protocol.FileInfo, bool)
|
|
}
|
|
|
|
type XattrFilter interface {
|
|
Permit(string) bool
|
|
GetMaxSingleEntrySize() int
|
|
GetMaxTotalSize() int
|
|
}
|
|
|
|
type ScanResult struct {
|
|
File protocol.FileInfo
|
|
Err error
|
|
Path string // to be set in case Err != nil and File == nil
|
|
}
|
|
|
|
func Walk(ctx context.Context, cfg Config) chan ScanResult {
|
|
return newWalker(cfg).walk(ctx)
|
|
}
|
|
|
|
func WalkWithoutHashing(ctx context.Context, cfg Config) chan ScanResult {
|
|
return newWalker(cfg).walkWithoutHashing(ctx)
|
|
}
|
|
|
|
func newWalker(cfg Config) *walker {
|
|
w := &walker{cfg}
|
|
|
|
if w.CurrentFiler == nil {
|
|
w.CurrentFiler = noCurrentFiler{}
|
|
}
|
|
if w.Filesystem == nil {
|
|
panic("no filesystem specified")
|
|
}
|
|
if w.Matcher == nil {
|
|
w.Matcher = ignore.New(w.Filesystem)
|
|
}
|
|
|
|
registerFolderMetrics(w.Folder)
|
|
return w
|
|
}
|
|
|
|
var (
|
|
errUTF8Invalid = errors.New("item is not in UTF8 encoding")
|
|
errUTF8Normalization = errors.New("item is not in the correct UTF8 normalization form")
|
|
errUTF8Conflict = errors.New("item has UTF8 encoding conflict with another item")
|
|
)
|
|
|
|
type walker struct {
|
|
Config
|
|
}
|
|
|
|
// Walk returns the list of files found in the local folder by scanning the
|
|
// file system. Files are blockwise hashed.
|
|
func (w *walker) walk(ctx context.Context) chan ScanResult {
|
|
l.Debugln(w, "Walk", w.Subs, w.Matcher)
|
|
|
|
toHashChan := make(chan protocol.FileInfo)
|
|
finishedChan := make(chan ScanResult)
|
|
|
|
// A routine which walks the filesystem tree, and sends files which have
|
|
// been modified to the counter routine.
|
|
go w.scan(ctx, toHashChan, finishedChan)
|
|
|
|
// We're not required to emit scan progress events, just kick off hashers,
|
|
// and feed inputs directly from the walker.
|
|
if w.ProgressTickIntervalS < 0 {
|
|
newParallelHasher(ctx, w.Folder, w.Filesystem, w.Hashers, finishedChan, toHashChan, nil, nil)
|
|
return finishedChan
|
|
}
|
|
|
|
// Defaults to every 2 seconds.
|
|
if w.ProgressTickIntervalS == 0 {
|
|
w.ProgressTickIntervalS = 2
|
|
}
|
|
|
|
ticker := time.NewTicker(time.Duration(w.ProgressTickIntervalS) * time.Second)
|
|
|
|
// We need to emit progress events, hence we create a routine which buffers
|
|
// the list of files to be hashed, counts the total number of
|
|
// bytes to hash, and once no more files need to be hashed (chan gets closed),
|
|
// start a routine which periodically emits FolderScanProgress events,
|
|
// until a stop signal is sent by the parallel hasher.
|
|
// Parallel hasher is stopped by this routine when we close the channel over
|
|
// which it receives the files we ask it to hash.
|
|
go func() {
|
|
var filesToHash []protocol.FileInfo
|
|
var total int64 = 1
|
|
|
|
for file := range toHashChan {
|
|
filesToHash = append(filesToHash, file)
|
|
total += file.Size
|
|
}
|
|
|
|
realToHashChan := make(chan protocol.FileInfo)
|
|
done := make(chan struct{})
|
|
progress := newByteCounter()
|
|
|
|
newParallelHasher(ctx, w.Folder, w.Filesystem, w.Hashers, finishedChan, realToHashChan, progress, done)
|
|
|
|
// A routine which actually emits the FolderScanProgress events
|
|
// every w.ProgressTicker ticks, until the hasher routines terminate.
|
|
go func() {
|
|
defer progress.Close()
|
|
|
|
for {
|
|
select {
|
|
case <-done:
|
|
l.Debugln(w, "Walk progress done", w.Folder, w.Subs, w.Matcher)
|
|
ticker.Stop()
|
|
return
|
|
case <-ticker.C:
|
|
current := progress.Total()
|
|
rate := progress.Rate()
|
|
l.Debugf("%v: Walk %s %s current progress %d/%d at %.01f MiB/s (%d%%)", w, w.Folder, w.Subs, current, total, rate/1024/1024, current*100/total)
|
|
w.EventLogger.Log(events.FolderScanProgress, map[string]interface{}{
|
|
"folder": w.Folder,
|
|
"current": current,
|
|
"total": total,
|
|
"rate": rate, // bytes per second
|
|
})
|
|
case <-ctx.Done():
|
|
ticker.Stop()
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
|
|
loop:
|
|
for _, file := range filesToHash {
|
|
l.Debugln(w, "real to hash:", file.Name)
|
|
select {
|
|
case realToHashChan <- file:
|
|
case <-ctx.Done():
|
|
break loop
|
|
}
|
|
}
|
|
close(realToHashChan)
|
|
}()
|
|
|
|
return finishedChan
|
|
}
|
|
|
|
func (w *walker) walkWithoutHashing(ctx context.Context) chan ScanResult {
|
|
l.Debugln(w, "Walk without hashing", w.Subs, w.Matcher)
|
|
|
|
toHashChan := make(chan protocol.FileInfo)
|
|
finishedChan := make(chan ScanResult)
|
|
|
|
// A routine which walks the filesystem tree, and sends files which have
|
|
// been modified to the counter routine.
|
|
go w.scan(ctx, toHashChan, finishedChan)
|
|
|
|
go func() {
|
|
for file := range toHashChan {
|
|
finishedChan <- ScanResult{File: file}
|
|
}
|
|
close(finishedChan)
|
|
}()
|
|
|
|
return finishedChan
|
|
}
|
|
|
|
func (w *walker) scan(ctx context.Context, toHashChan chan<- protocol.FileInfo, finishedChan chan<- ScanResult) {
|
|
hashFiles := w.walkAndHashFiles(ctx, toHashChan, finishedChan)
|
|
if len(w.Subs) == 0 {
|
|
w.Filesystem.Walk(".", hashFiles)
|
|
} else {
|
|
for _, sub := range w.Subs {
|
|
if err := osutil.TraversesSymlink(w.Filesystem, filepath.Dir(sub)); err != nil {
|
|
l.Debugf("%v: Skip walking %v as it is below a symlink", w, sub)
|
|
continue
|
|
}
|
|
w.Filesystem.Walk(sub, hashFiles)
|
|
}
|
|
}
|
|
close(toHashChan)
|
|
}
|
|
|
|
func (w *walker) walkAndHashFiles(ctx context.Context, toHashChan chan<- protocol.FileInfo, finishedChan chan<- ScanResult) fs.WalkFunc {
|
|
now := time.Now()
|
|
ignoredParent := ""
|
|
|
|
return func(path string, info fs.FileInfo, err error) error {
|
|
select {
|
|
case <-ctx.Done():
|
|
return ctx.Err()
|
|
default:
|
|
}
|
|
|
|
metricScannedItems.WithLabelValues(w.Folder).Inc()
|
|
|
|
// Return value used when we are returning early and don't want to
|
|
// process the item. For directories, this means do-not-descend.
|
|
var skip error // nil
|
|
// info nil when error is not nil
|
|
if info != nil && info.IsDir() {
|
|
skip = fs.SkipDir
|
|
}
|
|
|
|
if !utf8.ValidString(path) {
|
|
handleError(ctx, "scan", path, errUTF8Invalid, finishedChan)
|
|
return skip
|
|
}
|
|
|
|
if fs.IsTemporary(path) {
|
|
l.Debugln(w, "temporary:", path, "err:", err)
|
|
if err == nil && info.IsRegular() && info.ModTime().Add(w.TempLifetime).Before(now) {
|
|
w.Filesystem.Remove(path)
|
|
l.Debugln(w, "removing temporary:", path, info.ModTime())
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if fs.IsInternal(path) {
|
|
l.Debugln(w, "ignored (internal):", path)
|
|
return skip
|
|
}
|
|
|
|
if w.Matcher.Match(path).IsIgnored() {
|
|
l.Debugln(w, "ignored (patterns):", path)
|
|
// Only descend if matcher says so and the current file is not a symlink.
|
|
if err != nil || w.Matcher.SkipIgnoredDirs() || info.IsSymlink() {
|
|
return skip
|
|
}
|
|
// If the parent wasn't ignored already, set this path as the "highest" ignored parent
|
|
if info.IsDir() && (ignoredParent == "" || !fs.IsParent(path, ignoredParent)) {
|
|
ignoredParent = path
|
|
}
|
|
return nil
|
|
}
|
|
|
|
if err != nil {
|
|
// No need reporting errors for files that don't exist (e.g. scan
|
|
// due to filesystem watcher)
|
|
if !fs.IsNotExist(err) {
|
|
handleError(ctx, "scan", path, err, finishedChan)
|
|
}
|
|
return skip
|
|
}
|
|
|
|
if path == "." {
|
|
return nil
|
|
}
|
|
|
|
if ignoredParent == "" {
|
|
// parent isn't ignored, nothing special
|
|
return w.handleItem(ctx, path, info, toHashChan, finishedChan, skip)
|
|
}
|
|
|
|
// Part of current path below the ignored (potential) parent
|
|
rel := strings.TrimPrefix(path, ignoredParent+string(fs.PathSeparator))
|
|
|
|
// ignored path isn't actually a parent of the current path
|
|
if rel == path {
|
|
ignoredParent = ""
|
|
return w.handleItem(ctx, path, info, toHashChan, finishedChan, skip)
|
|
}
|
|
|
|
// The previously ignored parent directories of the current, not
|
|
// ignored path need to be handled as well.
|
|
// Prepend an empty string to handle ignoredParent without anything
|
|
// appended in the first iteration.
|
|
for _, name := range append([]string{""}, fs.PathComponents(rel)...) {
|
|
ignoredParent = filepath.Join(ignoredParent, name)
|
|
info, err = w.Filesystem.Lstat(ignoredParent)
|
|
// An error here would be weird as we've already gotten to this point, but act on it nonetheless
|
|
if err != nil {
|
|
handleError(ctx, "scan", ignoredParent, err, finishedChan)
|
|
return skip
|
|
}
|
|
if err = w.handleItem(ctx, ignoredParent, info, toHashChan, finishedChan, skip); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
ignoredParent = ""
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func (w *walker) handleItem(ctx context.Context, path string, info fs.FileInfo, toHashChan chan<- protocol.FileInfo, finishedChan chan<- ScanResult, skip error) error {
|
|
oldPath := path
|
|
path, err := w.normalizePath(path, info)
|
|
if err != nil {
|
|
handleError(ctx, "normalizing path", oldPath, err, finishedChan)
|
|
return skip
|
|
}
|
|
|
|
switch {
|
|
case info.IsSymlink():
|
|
if err := w.walkSymlink(ctx, path, info, finishedChan); err != nil {
|
|
return err
|
|
}
|
|
if info.IsDir() {
|
|
// under no circumstances shall we descend into a symlink
|
|
return fs.SkipDir
|
|
}
|
|
return nil
|
|
|
|
case info.IsDir():
|
|
err = w.walkDir(ctx, path, info, finishedChan)
|
|
|
|
case info.IsRegular():
|
|
err = w.walkRegular(ctx, path, info, toHashChan)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func (w *walker) walkRegular(ctx context.Context, relPath string, info fs.FileInfo, toHashChan chan<- protocol.FileInfo) error {
|
|
curFile, hasCurFile := w.CurrentFiler.CurrentFile(relPath)
|
|
|
|
blockSize := protocol.BlockSize(info.Size())
|
|
|
|
if hasCurFile {
|
|
// Check if we should retain current block size.
|
|
curBlockSize := curFile.BlockSize()
|
|
if blockSize > curBlockSize && blockSize/curBlockSize <= 2 {
|
|
// New block size is larger, but not more than twice larger.
|
|
// Retain.
|
|
blockSize = curBlockSize
|
|
} else if curBlockSize > blockSize && curBlockSize/blockSize <= 2 {
|
|
// Old block size is larger, but not more than twice larger.
|
|
// Retain.
|
|
blockSize = curBlockSize
|
|
}
|
|
}
|
|
|
|
f, err := CreateFileInfo(info, relPath, w.Filesystem, w.ScanOwnership, w.ScanXattrs, w.XattrFilter)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
f = w.updateFileInfo(f, curFile)
|
|
f.NoPermissions = w.IgnorePerms
|
|
f.RawBlockSize = blockSize
|
|
l.Debugln(w, "checking:", f)
|
|
|
|
if hasCurFile {
|
|
if curFile.IsEquivalentOptional(f, protocol.FileInfoComparison{
|
|
ModTimeWindow: w.ModTimeWindow,
|
|
IgnorePerms: w.IgnorePerms,
|
|
IgnoreBlocks: true,
|
|
IgnoreFlags: w.LocalFlags,
|
|
IgnoreOwnership: !w.ScanOwnership,
|
|
IgnoreXattrs: !w.ScanXattrs,
|
|
}) {
|
|
l.Debugln(w, "unchanged:", curFile)
|
|
return nil
|
|
}
|
|
if curFile.ShouldConflict() {
|
|
// The old file was invalid for whatever reason and probably not
|
|
// up to date with what was out there in the cluster. Drop all
|
|
// others from the version vector to indicate that we haven't
|
|
// taken their version into account, and possibly cause a
|
|
// conflict.
|
|
f.Version = f.Version.DropOthers(w.ShortID)
|
|
}
|
|
l.Debugln(w, "rescan:", curFile)
|
|
}
|
|
|
|
l.Debugln(w, "to hash:", relPath, f)
|
|
|
|
select {
|
|
case toHashChan <- f:
|
|
case <-ctx.Done():
|
|
return ctx.Err()
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (w *walker) walkDir(ctx context.Context, relPath string, info fs.FileInfo, finishedChan chan<- ScanResult) error {
|
|
curFile, hasCurFile := w.CurrentFiler.CurrentFile(relPath)
|
|
|
|
f, err := CreateFileInfo(info, relPath, w.Filesystem, w.ScanOwnership, w.ScanXattrs, w.XattrFilter)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
f = w.updateFileInfo(f, curFile)
|
|
f.NoPermissions = w.IgnorePerms
|
|
l.Debugln(w, "checking:", f)
|
|
|
|
if hasCurFile {
|
|
if curFile.IsEquivalentOptional(f, protocol.FileInfoComparison{
|
|
ModTimeWindow: w.ModTimeWindow,
|
|
IgnorePerms: w.IgnorePerms,
|
|
IgnoreBlocks: true,
|
|
IgnoreFlags: w.LocalFlags,
|
|
IgnoreOwnership: !w.ScanOwnership,
|
|
IgnoreXattrs: !w.ScanXattrs,
|
|
}) {
|
|
l.Debugln(w, "unchanged:", curFile)
|
|
return nil
|
|
}
|
|
if curFile.ShouldConflict() {
|
|
// The old file was invalid for whatever reason and probably not
|
|
// up to date with what was out there in the cluster. Drop all
|
|
// others from the version vector to indicate that we haven't
|
|
// taken their version into account, and possibly cause a
|
|
// conflict.
|
|
f.Version = f.Version.DropOthers(w.ShortID)
|
|
}
|
|
l.Debugln(w, "rescan:", curFile)
|
|
}
|
|
|
|
l.Debugln(w, "dir:", relPath, f)
|
|
|
|
select {
|
|
case finishedChan <- ScanResult{File: f}:
|
|
case <-ctx.Done():
|
|
return ctx.Err()
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// walkSymlink returns nil or an error, if the error is of the nature that
|
|
// it should stop the entire walk.
|
|
func (w *walker) walkSymlink(ctx context.Context, relPath string, info fs.FileInfo, finishedChan chan<- ScanResult) error {
|
|
// Symlinks are not supported on Windows. We ignore instead of returning
|
|
// an error.
|
|
if build.IsWindows {
|
|
return nil
|
|
}
|
|
|
|
f, err := CreateFileInfo(info, relPath, w.Filesystem, w.ScanOwnership, w.ScanXattrs, w.XattrFilter)
|
|
if err != nil {
|
|
handleError(ctx, "reading link", relPath, err, finishedChan)
|
|
return nil
|
|
}
|
|
|
|
curFile, hasCurFile := w.CurrentFiler.CurrentFile(relPath)
|
|
f = w.updateFileInfo(f, curFile)
|
|
l.Debugln(w, "checking:", f)
|
|
|
|
if hasCurFile {
|
|
if curFile.IsEquivalentOptional(f, protocol.FileInfoComparison{
|
|
ModTimeWindow: w.ModTimeWindow,
|
|
IgnorePerms: w.IgnorePerms,
|
|
IgnoreBlocks: true,
|
|
IgnoreFlags: w.LocalFlags,
|
|
IgnoreOwnership: !w.ScanOwnership,
|
|
IgnoreXattrs: !w.ScanXattrs,
|
|
}) {
|
|
l.Debugln(w, "unchanged:", curFile, info.ModTime().Unix(), info.Mode()&fs.ModePerm)
|
|
return nil
|
|
}
|
|
if curFile.ShouldConflict() {
|
|
// The old file was invalid for whatever reason and probably not
|
|
// up to date with what was out there in the cluster. Drop all
|
|
// others from the version vector to indicate that we haven't
|
|
// taken their version into account, and possibly cause a
|
|
// conflict.
|
|
f.Version = f.Version.DropOthers(w.ShortID)
|
|
}
|
|
l.Debugln(w, "rescan:", curFile)
|
|
}
|
|
|
|
l.Debugln(w, "symlink:", relPath, f)
|
|
|
|
select {
|
|
case finishedChan <- ScanResult{File: f}:
|
|
case <-ctx.Done():
|
|
return ctx.Err()
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// normalizePath returns the normalized relative path (possibly after fixing
|
|
// it on disk), or skip is true.
|
|
func (w *walker) normalizePath(path string, info fs.FileInfo) (normPath string, err error) {
|
|
if build.IsDarwin {
|
|
// Mac OS X file names should always be NFD normalized.
|
|
normPath = norm.NFD.String(path)
|
|
} else {
|
|
// Every other OS in the known universe uses NFC or just plain
|
|
// doesn't bother to define an encoding. In our case *we* do care,
|
|
// so we enforce NFC regardless.
|
|
normPath = norm.NFC.String(path)
|
|
}
|
|
|
|
if path == normPath {
|
|
// The file name is already normalized: nothing to do
|
|
return path, nil
|
|
}
|
|
|
|
if !w.AutoNormalize {
|
|
// We're not authorized to do anything about it, so complain and skip.
|
|
|
|
return "", errUTF8Normalization
|
|
}
|
|
|
|
// We will attempt to normalize it.
|
|
normInfo, err := w.Filesystem.Lstat(normPath)
|
|
if fs.IsNotExist(err) {
|
|
// Nothing exists with the normalized filename. Good.
|
|
if err = w.Filesystem.Rename(path, normPath); err != nil {
|
|
return "", err
|
|
}
|
|
l.Infof(`Normalized UTF8 encoding of file name "%s".`, path)
|
|
return normPath, nil
|
|
}
|
|
if w.Filesystem.SameFile(info, normInfo) {
|
|
// With some filesystems (ZFS), if there is an un-normalized path and you ask whether the normalized
|
|
// version exists, it responds with true. Therefore we need to check fs.SameFile as well.
|
|
// In this case, a call to Rename won't do anything, so we have to rename via a temp file.
|
|
|
|
// We don't want to use the standard syncthing prefix here, as that will result in the file being ignored
|
|
// and eventually deleted by Syncthing if the rename back fails.
|
|
|
|
tempPath := fs.TempNameWithPrefix(normPath, "")
|
|
if err = w.Filesystem.Rename(path, tempPath); err != nil {
|
|
return "", err
|
|
}
|
|
if err = w.Filesystem.Rename(tempPath, normPath); err != nil {
|
|
// I don't ever expect this to happen, but if it does, we should probably tell our caller that the normalized
|
|
// path is the temp path: that way at least the user's data still gets synced.
|
|
l.Warnf(`Error renaming "%s" to "%s" while normalizating UTF8 encoding: %v. You will want to rename this file back manually`, tempPath, normPath, err)
|
|
return tempPath, nil
|
|
}
|
|
return normPath, nil
|
|
}
|
|
// There is something already in the way at the normalized
|
|
// file name.
|
|
return "", errUTF8Conflict
|
|
}
|
|
|
|
// updateFileInfo updates walker specific members of protocol.FileInfo that
|
|
// do not depend on type, and things that should be preserved from the
|
|
// previous version of the FileInfo.
|
|
func (w *walker) updateFileInfo(dst, src protocol.FileInfo) protocol.FileInfo {
|
|
if dst.Type == protocol.FileInfoTypeFile && build.IsWindows {
|
|
// If we have an existing index entry, copy the executable bits
|
|
// from there.
|
|
dst.Permissions |= (src.Permissions & 0o111)
|
|
}
|
|
dst.Version = src.Version.Update(w.ShortID)
|
|
dst.ModifiedBy = w.ShortID
|
|
dst.LocalFlags = w.LocalFlags
|
|
|
|
// Copy OS data from src to dst, unless it was already set on dst.
|
|
dst.Platform.MergeWith(&src.Platform)
|
|
|
|
return dst
|
|
}
|
|
|
|
func handleError(ctx context.Context, context, path string, err error, finishedChan chan<- ScanResult) {
|
|
select {
|
|
case finishedChan <- ScanResult{
|
|
Err: fmt.Errorf("%s: %w", context, err),
|
|
Path: path,
|
|
}:
|
|
case <-ctx.Done():
|
|
}
|
|
}
|
|
|
|
func (w *walker) String() string {
|
|
return fmt.Sprintf("walker/%s@%p", w.Folder, w)
|
|
}
|
|
|
|
// A byteCounter gets bytes added to it via Update() and then provides the
|
|
// Total() and one minute moving average Rate() in bytes per second.
|
|
type byteCounter struct {
|
|
total atomic.Int64
|
|
metrics.EWMA
|
|
stop chan struct{}
|
|
}
|
|
|
|
func newByteCounter() *byteCounter {
|
|
c := &byteCounter{
|
|
EWMA: metrics.NewEWMA1(), // a one minute exponentially weighted moving average
|
|
stop: make(chan struct{}),
|
|
}
|
|
go c.ticker()
|
|
return c
|
|
}
|
|
|
|
func (c *byteCounter) ticker() {
|
|
// The metrics.EWMA expects clock ticks every five seconds in order to
|
|
// decay the average properly.
|
|
t := time.NewTicker(5 * time.Second)
|
|
for {
|
|
select {
|
|
case <-t.C:
|
|
c.Tick()
|
|
case <-c.stop:
|
|
t.Stop()
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *byteCounter) Update(bytes int64) {
|
|
c.total.Add(bytes)
|
|
c.EWMA.Update(bytes)
|
|
}
|
|
|
|
func (c *byteCounter) Total() int64 { return c.total.Load() }
|
|
|
|
func (c *byteCounter) Close() {
|
|
close(c.stop)
|
|
}
|
|
|
|
// A no-op CurrentFiler
|
|
|
|
type noCurrentFiler struct{}
|
|
|
|
func (noCurrentFiler) CurrentFile(_ string) (protocol.FileInfo, bool) {
|
|
return protocol.FileInfo{}, false
|
|
}
|
|
|
|
func CreateFileInfo(fi fs.FileInfo, name string, filesystem fs.Filesystem, scanOwnership bool, scanXattrs bool, xattrFilter XattrFilter) (protocol.FileInfo, error) {
|
|
f := protocol.FileInfo{Name: name}
|
|
if scanOwnership || scanXattrs {
|
|
if plat, err := filesystem.PlatformData(name, scanOwnership, scanXattrs, xattrFilter); err == nil {
|
|
f.Platform = plat
|
|
} else {
|
|
return protocol.FileInfo{}, fmt.Errorf("reading platform data: %w", err)
|
|
}
|
|
}
|
|
if fi.IsSymlink() {
|
|
f.Type = protocol.FileInfoTypeSymlink
|
|
target, err := filesystem.ReadSymlink(name)
|
|
if err != nil {
|
|
return protocol.FileInfo{}, err
|
|
}
|
|
f.SymlinkTarget = target
|
|
f.NoPermissions = true // Symlinks don't have permissions of their own
|
|
return f, nil
|
|
}
|
|
f.Permissions = uint32(fi.Mode() & fs.ModePerm)
|
|
f.ModifiedS = fi.ModTime().Unix()
|
|
f.ModifiedNs = fi.ModTime().Nanosecond()
|
|
if fi.IsDir() {
|
|
f.Type = protocol.FileInfoTypeDirectory
|
|
return f, nil
|
|
}
|
|
f.Size = fi.Size()
|
|
f.Type = protocol.FileInfoTypeFile
|
|
if ct := fi.InodeChangeTime(); !ct.IsZero() {
|
|
f.InodeChangeNs = ct.UnixNano()
|
|
} else {
|
|
f.InodeChangeNs = 0
|
|
}
|
|
return f, nil
|
|
}
|