Remove path from fsentry metadata, make vfs and webdav work again with fixes

This commit is contained in:
timurgordon
2025-03-12 02:16:40 +01:00
parent f1991d89b3
commit ff430c2e4d
48 changed files with 1424 additions and 1350 deletions

View File

@@ -1,27 +1,20 @@
#!/usr/bin/env -S v -n -w -gc none -cc tcc -d use_openssl -enable-globals run
// import freeflowuniverse.herolib.vfs.webdav
import freeflowuniverse.herolib.vfs.vfs_nested
import freeflowuniverse.herolib.vfs.vfs_core
import freeflowuniverse.herolib.vfs.vfs_ourdb
import freeflowuniverse.herolib.dav.webdav
import freeflowuniverse.herolib.vfs.vfs_db
import freeflowuniverse.herolib.data.ourdb
import os
import log
mut high_level_vfs := vfsnested.new()
const database_path := os.join_path(os.dir(@FILE), 'database')
// lower level VFS Implementations that use OurDB
mut vfs1 := vfsourdb.new('/tmp/test_webdav_ourdbvfs/vfs1', '/tmp/test_webdav_ourdbvfs/vfs1')!
mut vfs2 := vfsourdb.new('/tmp/test_webdav_ourdbvfs/vfs2', '/tmp/test_webdav_ourdbvfs/vfs2')!
mut vfs3 := vfsourdb.new('/tmp/test_webdav_ourdbvfs/vfs3', '/tmp/test_webdav_ourdbvfs/vfs3')!
mut metadata_db := ourdb.new(path:os.join_path(database_path, 'metadata'))!
mut data_db := ourdb.new(path:os.join_path(database_path, 'data'))!
mut vfs := vfs_db.new(mut metadata_db, mut data_db)!
mut server := webdav.new_server(vfs: vfs, user_db: {
'admin': '123'
})!
// Nest OurDB VFS instances at different paths
high_level_vfs.add_vfs('/data', vfs1) or { panic(err) }
high_level_vfs.add_vfs('/config', vfs2) or { panic(err) }
high_level_vfs.add_vfs('/data/backup', vfs3) or { panic(err) } // Nested under /data
log.set_level(.debug)
// // Create WebDAV Server that uses high level VFS
// mut webdav_server := webdav.new_app(
// vfs: high_level_vfs
// user_db: {
// 'omda': '123'
// }
// )!
// webdav_server.run()
server.run()

View File

@@ -116,11 +116,20 @@ pub fn name_fix_dot_notation_to_snake_case(name string) string {
return name.replace('.', '_')
}
// remove underscores and extension
pub fn name_fix_no_underscore_no_ext(name_ string) string {
return name_fix_keepext(name_).all_before_last('.').replace('_', '')
// normalize a file path while preserving path structure
pub fn path_fix(path_ string) string {
if path_.len == 0 {
return ''
}
return "${path_.trim('/')}"
}
// normalize a file path while preserving path structure
pub fn path_fix_absolute(path string) string {
return "/${path_fix(path)}"
}
// remove underscores and extension
pub fn name_fix_no_ext(name_ string) string {
return name_fix_keepext(name_).all_before_last('.').trim_right('_')

View File

@@ -6,3 +6,33 @@ fn test_main() {
assert name_fix_keepext('\$sds_?_!"`{_ 4F') == 'sds_4f'
assert name_fix_keepext('\$sds_?_!"`{_ 4F.jpg') == 'sds_4f.jpg'
}
fn test_path_fix() {
// Test empty path
assert path_fix('') == ''
// Test absolute paths
assert path_fix('/home/user') == '/home/user'
assert path_fix('/home/USER') == '/home/user'
assert path_fix('/home/user/Documents') == '/home/user/documents'
// Test relative paths
assert path_fix('home/user') == 'home/user'
assert path_fix('./home/user') == './home/user'
assert path_fix('../home/user') == '../home/user'
// Test paths with special characters
assert path_fix('/home/user/My Documents') == '/home/user/my_documents'
assert path_fix('/home/user/file-name.txt') == '/home/user/file_name.txt'
assert path_fix('/home/user/file name with spaces.txt') == '/home/user/file_name_with_spaces.txt'
// Test paths with multiple special characters
assert path_fix('/home/user/!@#$%^&*()_+.txt') == '/home/user/'
// Test paths with multiple components and extensions
assert path_fix('/home/user/Documents/report.pdf') == '/home/user/documents/report.pdf'
assert path_fix('/home/user/Documents/report.PDF') == '/home/user/documents/report.pdf'
// Test paths with multiple slashes
assert path_fix('/home//user///documents') == '/home/user/documents'
}

View File

@@ -75,7 +75,6 @@ pub fn (mut db OurDB) set_(x u32, old_location Location, data []u8) ! {
file_nr: file_nr
position: u32(db.file.tell()!)
}
println('Writing ${x} data at position: ${new_location.position}, size: ${data.len}')
// Calculate CRC of data
crc := calculate_crc(data)
@@ -120,18 +119,15 @@ fn (mut db OurDB) get_(location Location) ![]u8 {
db.db_file_select(location.file_nr)!
if location.position == 0 {
return error('Record not found')
return error('Record not found, location: ${location}')
}
// Seek to position
db.file.seek(i64(location.position), .start)!
// Read header
mut header := []u8{len: header_size}
header_read_bytes := db.file.read(mut header)!
if header_read_bytes != header_size {
header := db.file.read_bytes_at(header_size, location.position)
if header.len != header_size {
return error('failed to read header')
}
// Parse size (2 bytes)
size := u16(header[0]) | (u16(header[1]) << 8)
@@ -139,6 +135,8 @@ fn (mut db OurDB) get_(location Location) ![]u8 {
stored_crc := u32(header[2]) | (u32(header[3]) << 8) | (u32(header[4]) << 16) | (u32(header[5]) << 24)
// Read data
// seek data beginning
db.file.seek(i64(location.position+12), .start)!
mut data := []u8{len: int(size)}
data_read_bytes := db.file.read(mut data) or {
return error('Failed to read file, ${size} ${err}')

View File

@@ -149,3 +149,106 @@ You can configure the WebDAV server using the following parameters when calling
- Support for advanced WebDAV methods like `LOCK` and `UNLOCK`.
- Integration with persistent databases for user credentials.
- TLS/SSL support for secure connections.
# WebDAV Property Model
This file implements the WebDAV property model as defined in [RFC 4918](https://tools.ietf.org/html/rfc4918). It provides a set of property types that represent various WebDAV properties used in PROPFIND and PROPPATCH operations.
## Overview
The `model_property.v` file defines:
1. A `Property` interface that all WebDAV properties must implement
2. Various property type implementations for standard WebDAV properties
3. Helper functions for XML serialization and time formatting
## Property Interface
```v
pub interface Property {
xml() string
xml_name() string
}
```
All WebDAV properties must implement:
- `xml()`: Returns the full XML representation of the property with its value
- `xml_name()`: Returns just the XML tag name of the property (used in property requests)
## Property Types
The file implements the following WebDAV property types:
| Property Type | Description |
|---------------|-------------|
| `DisplayName` | The display name of a resource |
| `GetLastModified` | Last modification time of a resource |
| `GetContentType` | MIME type of a resource |
| `GetContentLength` | Size of a resource in bytes |
| `ResourceType` | Indicates if a resource is a collection (directory) or not |
| `CreationDate` | Creation date of a resource |
| `SupportedLock` | Lock capabilities supported by the server |
| `LockDiscovery` | Active locks on a resource |
## Helper Functions
- `fn (p []Property) xml() string`: Generates XML for a list of properties
- `fn format_iso8601(t time.Time) string`: Formats a time in ISO8601 format for WebDAV
## Usage
These property types are used when responding to WebDAV PROPFIND requests to describe resources in the WebDAV server.
# WebDAV Locker
This file implements a locking mechanism for resources in a WebDAV context. It provides functionality to manage locks on resources, ensuring that they are not modified by multiple clients simultaneously.
## Overview
The `locker.v` file defines:
1. A `Locker` structure that manages locks for resources.
2. A `LockResult` structure that represents the result of a lock operation.
3. Methods for locking and unlocking resources, checking lock status, and managing locks.
## Locker Structure
```v
struct Locker {
mut:
locks map[string]Lock
}
```
- `locks`: A mutable map that stores locks keyed by resource name.
## LockResult Structure
```v
pub struct LockResult {
pub:
token string // The lock token
is_new_lock bool // Whether this is a new lock or an existing one
}
```
- `token`: The unique identifier for the lock.
- `is_new_lock`: Indicates if this is a new lock or an existing one.
## Locking and Unlocking
- `pub fn (mut lm Locker) lock(l Lock) !Lock`: Attempts to lock a resource for a specific owner. Returns a `LockResult` with the lock token and whether it's a new lock.
- `pub fn (mut lm Locker) unlock(resource string) bool`: Unlocks a resource by removing its lock.
- `pub fn (lm Locker) is_locked(resource string) bool`: Checks if a resource is currently locked.
- `pub fn (lm Locker) get_lock(resource string) ?Lock`: Returns the lock object for a resource if it exists and is valid.
- `pub fn (mut lm Locker) unlock_with_token(resource string, token string) bool`: Unlocks a resource if the correct token is provided.
## Recursive Locking
- `pub fn (mut lm Locker) lock_recursive(l Lock) !Lock`: Locks a resource recursively, allowing for child resources to be locked (implementation for child resources is not complete).
## Cleanup
- `pub fn (mut lm Locker) cleanup_expired_locks()`: Cleans up expired locks (implementation is currently commented out).

View File

@@ -1,206 +0,0 @@
module webdav
import encoding.xml
import log
import freeflowuniverse.herolib.core.pathlib
import freeflowuniverse.herolib.vfs
import freeflowuniverse.herolib.vfs.vfs_db
import os
import time
import net.http
import veb
// PropfindRequest represents a parsed PROPFIND request
pub struct PropfindRequest {
pub:
typ PropfindType
props []string // Property names if typ is prop
depth Depth // Depth of the request (0, 1, or -1 for infinity)
xml_content string // Original XML content
}
pub enum Depth {
infinity = -1
zero = 0
one = 1
}
// PropfindType represents the type of PROPFIND request
pub enum PropfindType {
allprop // Request all properties
propname // Request property names only
prop // Request specific properties
invalid // Invalid request
}
// parse_propfind_xml parses the XML body of a PROPFIND request
pub fn parse_propfind_xml(req http.Request) !PropfindRequest {
data := req.data
// Parse Depth header
depth_str := req.header.get_custom('Depth') or { '0' }
depth := parse_depth(depth_str)
if data.len == 0 {
// If no body is provided, default to allprop
return PropfindRequest{
typ: .allprop
depth: depth
xml_content: ''
}
}
doc := xml.XMLDocument.from_string(data) or {
return error('Failed to parse XML: ${err}')
}
root := doc.root
if root.name.to_lower() != 'propfind' && !root.name.ends_with(':propfind') {
return error('Invalid PROPFIND request: root element must be propfind')
}
mut typ := PropfindType.invalid
mut props := []string{}
// Check for allprop, propname, or prop elements
for child in root.children {
if child is xml.XMLNode {
node := child as xml.XMLNode
// Check for allprop
if node.name == 'allprop' || node.name == 'D:allprop' {
typ = .allprop
break
}
// Check for propname
if node.name == 'propname' || node.name == 'D:propname' {
typ = .propname
break
}
// Check for prop
if node.name == 'prop' || node.name == 'D:prop' {
typ = .prop
// Extract property names
for prop_child in node.children {
if prop_child is xml.XMLNode {
prop_node := prop_child as xml.XMLNode
props << prop_node.name
}
}
break
}
}
}
if typ == .invalid {
return error('Invalid PROPFIND request: missing prop, allprop, or propname element')
}
return PropfindRequest{
typ: typ
props: props
depth: depth
xml_content: data
}
}
// parse_depth parses the Depth header value
pub fn parse_depth(depth_str string) Depth {
if depth_str == 'infinity' { return .infinity}
else if depth_str == '0' { return .zero}
else if depth_str == '1' { return .one}
else {
log.warn('[WebDAV] Invalid Depth header value: ${depth_str}, defaulting to infinity')
return .infinity
}
}
// returns the properties of a filesystem entry
fn get_properties(entry &vfs.FSEntry) []Property {
mut props := []Property{}
metadata := entry.get_metadata()
// Display name
props << DisplayName(metadata.name)
props << GetLastModified(format_iso8601(metadata.modified_time()))
props << GetContentType(if entry.is_dir() {'httpd/unix-directory'} else {get_file_content_type(entry.get_path())})
props << ResourceType(entry.is_dir())
// Content length (only for files)
if !entry.is_dir() {
props << GetContentLength(metadata.size.str())
}
// Creation date
props << CreationDate(format_iso8601(metadata.created_time()))
return props
}
// Response represents a WebDAV response for a resource
pub struct Response {
pub:
href string
found_props []Property
not_found_props []Property
}
fn (r Response) xml() string {
return '<D:response>\n<D:href>${r.href}</D:href>
<D:propstat><D:prop>${r.found_props.map(it.xml()).join_lines()}</D:prop><D:status>HTTP/1.1 200 OK</D:status></D:propstat>
</D:response>'
}
// generate_propfind_response generates a PROPFIND response XML string from Response structs
pub fn (r []Response) xml () string {
return '<?xml version="1.0" encoding="UTF-8"?>\n<D:multistatus xmlns:D="DAV:">
${r.map(it.xml()).join_lines()}\n</D:multistatus>'
}
fn get_file_content_type(path string) string {
ext := path.all_after_last('.')
content_type := if v := veb.mime_types[ext] {
v
} else {
'text/plain; charset=utf-8'
}
return content_type
}
// get_responses returns all properties for the given path and depth
fn (mut app App) get_responses(entry vfs.FSEntry, req PropfindRequest) ![]Response {
mut responses := []Response{}
path := if entry.is_dir() && entry.get_path() != '/' {
'${entry.get_path()}/'
} else {
entry.get_path()
}
log.debug('Finfing for ${path}')
// main entry response
responses << Response {
href: path
// not_found: entry.get_unfound_properties(req)
found_props: get_properties(entry)
}
if !entry.is_dir() || req.depth == .zero {
return responses
}
entries := app.vfs.dir_list(path) or {
log.error('Failed to list directory for ${path} ${err}')
return responses }
for e in entries {
responses << app.get_responses(e, PropfindRequest {
...req,
depth: if req.depth == .one { .zero } else { .infinity }
})!
}
return responses
}

View File

@@ -5,10 +5,10 @@ import freeflowuniverse.herolib.ui.console
import freeflowuniverse.herolib.vfs
@[heap]
pub struct App {
pub struct Server {
veb.Middleware[Context]
pub mut:
lock_manager LockManager
lock_manager Locker
user_db map[string]string @[required]
vfs vfs.VFSImplementation
}
@@ -18,23 +18,23 @@ pub struct Context {
}
@[params]
pub struct AppArgs {
pub struct ServerArgs {
pub mut:
user_db map[string]string @[required]
vfs vfs.VFSImplementation
}
pub fn new_app(args AppArgs) !&App {
mut app := &App{
pub fn new_server(args ServerArgs) !&Server {
mut server := &Server{
user_db: args.user_db.clone()
vfs: args.vfs
}
// register middlewares for all routes
app.use(handler: app.auth_middleware)
app.use(handler: middleware_log_request)
app.use(handler: middleware_log_response, after: true)
return app
server.use(handler: server.auth_middleware)
server.use(handler: middleware_log_request)
server.use(handler: middleware_log_response, after: true)
return server
}
@[params]
@@ -44,11 +44,11 @@ pub mut:
background bool
}
pub fn (mut app App) run(params RunParams) {
pub fn (mut server Server) run(params RunParams) {
console.print_green('Running the server on port: ${params.port}')
if params.background {
spawn veb.run[App, Context](mut app, params.port)
spawn veb.run[Server, Context](mut server, params.port)
} else {
veb.run[App, Context](mut app, params.port)
veb.run[Server, Context](mut server, params.port)
}
}

View File

@@ -0,0 +1,22 @@
module webdav
import net.http
import freeflowuniverse.herolib.core.pathlib
import time
import freeflowuniverse.herolib.data.ourdb
import encoding.base64
import rand
import os
import freeflowuniverse.herolib.vfs.vfs_db
const testdata_path := os.join_path(os.dir(@FILE), 'testdata')
const database_path := os.join_path(testdata_path, 'database')
fn test_new_server() {
mut metadata_db := ourdb.new(path:os.join_path(database_path, 'metadata'))!
mut data_db := ourdb.new(path:os.join_path(database_path, 'data'))!
mut vfs := vfs_db.new(mut metadata_db, mut data_db)!
server := new_server(vfs: vfs, user_db: {
'admin': '123'
})!
}

View File

@@ -3,7 +3,7 @@ module webdav
import time
import rand
struct LockManager {
struct Locker {
mut:
locks map[string]Lock
}
@@ -18,7 +18,7 @@ pub:
// lock attempts to lock a resource for a specific owner
// Returns a LockResult with the lock token and whether it's a new lock
// Returns an error if the resource is already locked by a different owner
pub fn (mut lm LockManager) lock(l Lock) !Lock {
pub fn (mut lm Locker) lock(l Lock) !Lock {
if l.resource in lm.locks {
// Check if the lock is still valid
existing_lock := lm.locks[l.resource]
@@ -54,7 +54,7 @@ pub fn (mut lm LockManager) lock(l Lock) !Lock {
return new_lock
}
pub fn (mut lm LockManager) unlock(resource string) bool {
pub fn (mut lm Locker) unlock(resource string) bool {
if resource in lm.locks {
lm.locks.delete(resource)
return true
@@ -63,7 +63,7 @@ pub fn (mut lm LockManager) unlock(resource string) bool {
}
// is_locked checks if a resource is currently locked
pub fn (lm LockManager) is_locked(resource string) bool {
pub fn (lm Locker) is_locked(resource string) bool {
if resource in lm.locks {
lock_ := lm.locks[resource]
// Check if lock is expired
@@ -76,7 +76,7 @@ pub fn (lm LockManager) is_locked(resource string) bool {
}
// get_lock returns the Lock object for a resource if it exists and is valid
pub fn (lm LockManager) get_lock(resource string) ?Lock {
pub fn (lm Locker) get_lock(resource string) ?Lock {
if resource in lm.locks {
lock_ := lm.locks[resource]
// Check if lock is expired
@@ -88,7 +88,7 @@ pub fn (lm LockManager) get_lock(resource string) ?Lock {
return none
}
pub fn (mut lm LockManager) unlock_with_token(resource string, token string) bool {
pub fn (mut lm Locker) unlock_with_token(resource string, token string) bool {
if resource in lm.locks {
lock_ := lm.locks[resource]
if lock_.token == token {
@@ -99,7 +99,7 @@ pub fn (mut lm LockManager) unlock_with_token(resource string, token string) boo
return false
}
fn (mut lm LockManager) lock_recursive(l Lock) !Lock {
fn (mut lm Locker) lock_recursive(l Lock) !Lock {
if l.depth == 0 {
return lm.lock(l)
}
@@ -108,7 +108,7 @@ fn (mut lm LockManager) lock_recursive(l Lock) !Lock {
return lm.lock(l)
}
pub fn (mut lm LockManager) cleanup_expired_locks() {
pub fn (mut lm Locker) cleanup_expired_locks() {
// now := time.now().unix()
// lm.locks
// lm.locks = lm.locks.filter(it.value.created_at.unix() + it.value.timeout > now)

View File

@@ -0,0 +1,80 @@
module webdav
import time
import rand
fn test_lock() {
mut locker := Locker{locks: map[string]Lock{}}
// Lock the resource
result := locker.lock(
resource: 'test-resource',
owner: 'test-owner',
depth: 0,
timeout: 3600,
) or { panic(err) }
assert result.token != ''
assert locker.is_locked('test-resource')
}
fn test_unlock() {
mut locker := Locker{locks: map[string]Lock{}}
// Lock the resource
locker.lock(
resource: 'test-resource',
owner: 'test-owner',
depth: 0,
timeout: 3600,
) or { panic(err) }
// Unlock the resource
is_unlocked := locker.unlock('test-resource')
assert is_unlocked
assert !locker.is_locked('test-resource')
}
fn test_lock_with_different_owner() {
mut locker := Locker{locks: map[string]Lock{}}
lock1 := Lock{
resource: 'test-resource',
owner: 'owner1',
depth: 0,
timeout: 3600,
}
lock2 := Lock{
resource: 'test-resource',
owner: 'owner2',
depth: 0,
timeout: 3600,
}
// Lock the resource with the first owner
locker.lock(lock1) or { panic(err) }
// Attempt to lock the resource with a different owner
if result := locker.lock(lock2) {
assert false, 'locking should fail'
} else {
assert err == error('Resource is already locked by a different owner')
}
}
fn test_cleanup_expired_locks() {
mut locker := Locker{locks: map[string]Lock{}}
// Lock the resource
locker.lock(
resource: 'test-resource',
owner: 'test-owner',
depth: 0,
timeout: 1,
) or { panic(err) }
// Wait for the lock to expire
time.sleep(2 * time.second)
// Cleanup expired locks
locker.cleanup_expired_locks()
assert !locker.is_locked('test-resource')
}

View File

@@ -1,39 +0,0 @@
import freeflowuniverse.herolib.dav.webdav
import freeflowuniverse.herolib.vfs.vfs_nested
import freeflowuniverse.herolib.vfs
import freeflowuniverse.herolib.vfs.vfs_db
import os
fn test_logic() ! {
println('Testing OurDB VFS Logic to WebDAV Server...')
// Create test directories
test_data_dir := os.join_path(os.temp_dir(), 'vfs_db_test_data')
test_meta_dir := os.join_path(os.temp_dir(), 'vfs_db_test_meta')
os.mkdir_all(test_data_dir)!
os.mkdir_all(test_meta_dir)!
defer {
os.rmdir_all(test_data_dir) or {}
os.rmdir_all(test_meta_dir) or {}
}
// Create VFS instance; lower level VFS Implementations that use OurDB
mut vfs1 := vfs_db.new(test_data_dir, test_meta_dir)!
mut high_level_vfs := vfsnested.new()
// Nest OurDB VFS instances at different paths
high_level_vfs.add_vfs('/', vfs1) or { panic(err) }
// Test directory listing
entries := high_level_vfs.dir_list('/')!
assert entries.len == 1 // Data directory
// // Check if dir is existing
// assert high_level_vfs.exists('/') == true
// // Check if dir is not existing
// assert high_level_vfs.exists('/data') == true
}

View File

@@ -2,7 +2,7 @@ module webdav
import encoding.base64
fn (app &App) auth_middleware(mut ctx Context) bool {
fn (server &Server) auth_middleware(mut ctx Context) bool {
// return true
auth_header := ctx.get_header(.authorization) or {
ctx.res.set_status(.unauthorized)
@@ -33,7 +33,7 @@ fn (app &App) auth_middleware(mut ctx Context) bool {
}
username := split_credentials[0]
hashed_pass := split_credentials[1]
if user := app.user_db[username] {
if user := server.user_db[username] {
if user != hashed_pass {
ctx.res.set_status(.unauthorized)
ctx.res.header.add(.www_authenticate, 'Basic realm="WebDAV Server"')

View File

@@ -9,7 +9,7 @@ fn middleware_log_request(mut ctx Context) bool {
}
fn middleware_log_response(mut ctx Context) bool {
log.debug('[WebDAV] Response: ${ctx.req.url} ${ctx.res.header}\n')
log.debug('[WebDAV] Response: ${ctx.req.url} ${ctx.res.status()}\n')
return true
}

View File

@@ -3,7 +3,7 @@ module webdav
import encoding.xml
import time
pub struct Lock {
struct Lock {
pub mut:
resource string
owner string

View File

@@ -1,48 +0,0 @@
# WebDAV Property Model
This file implements the WebDAV property model as defined in [RFC 4918](https://tools.ietf.org/html/rfc4918). It provides a set of property types that represent various WebDAV properties used in PROPFIND and PROPPATCH operations.
## Overview
The `model_property.v` file defines:
1. A `Property` interface that all WebDAV properties must implement
2. Various property type implementations for standard WebDAV properties
3. Helper functions for XML serialization and time formatting
## Property Interface
```v
pub interface Property {
xml() string
xml_name() string
}
```
All WebDAV properties must implement:
- `xml()`: Returns the full XML representation of the property with its value
- `xml_name()`: Returns just the XML tag name of the property (used in property requests)
## Property Types
The file implements the following WebDAV property types:
| Property Type | Description |
|---------------|-------------|
| `DisplayName` | The display name of a resource |
| `GetLastModified` | Last modification time of a resource |
| `GetContentType` | MIME type of a resource |
| `GetContentLength` | Size of a resource in bytes |
| `ResourceType` | Indicates if a resource is a collection (directory) or not |
| `CreationDate` | Creation date of a resource |
| `SupportedLock` | Lock capabilities supported by the server |
| `LockDiscovery` | Active locks on a resource |
## Helper Functions
- `fn (p []Property) xml() string`: Generates XML for a list of properties
- `fn format_iso8601(t time.Time) string`: Formats a time in ISO8601 format for WebDAV
## Usage
These property types are used when responding to WebDAV PROPFIND requests to describe resources in the WebDAV server.

View File

@@ -0,0 +1,112 @@
module webdav
import encoding.xml
import log
import freeflowuniverse.herolib.core.pathlib
import freeflowuniverse.herolib.vfs
import os
import time
import veb
// Property represents a WebDAV property
pub interface Property {
xml() string
xml_name() string
}
type DisplayName = string
type GetLastModified = string
type GetContentType = string
type GetContentLength = string
type ResourceType = bool
type CreationDate = string
type SupportedLock = string
type LockDiscovery = string
fn (p []Property) xml() string {
return '<D:propstat>
<D:prop>${p.map(it.xml()).join_lines()}</D:prop>
<D:status>HTTP/1.1 200 OK</D:status>
</D:propstat>'
}
fn (p DisplayName) xml() string {
return '<D:displayname>${p}</D:displayname>'
}
fn (p DisplayName) xml_name() string {
return '<displayname/>'
}
fn (p GetLastModified) xml() string {
return '<D:getlastmodified>${p}</D:getlastmodified>'
}
fn (p GetLastModified) xml_name() string {
return '<getlastmodified/>'
}
fn (p GetContentType) xml() string {
return '<D:getcontenttype>${p}</D:getcontenttype>'
}
fn (p GetContentType) xml_name() string {
return '<getcontenttype/>'
}
fn (p GetContentLength) xml() string {
return '<D:getcontentlength>${p}</D:getcontentlength>'
}
fn (p GetContentLength) xml_name() string {
return '<getcontentlength/>'
}
fn (p ResourceType) xml() string {
return if p {
'<D:resourcetype><D:collection/></D:resourcetype>'
} else {
'<D:resourcetype/>'
}
}
fn (p ResourceType) xml_name() string {
return '<resourcetype/>'
}
fn (p CreationDate) xml() string {
return '<D:creationdate>${p}</D:creationdate>'
}
fn (p CreationDate) xml_name() string {
return '<creationdate/>'
}
fn (p SupportedLock) xml() string {
return '<D:supportedlock>
<D:lockentry>
<D:lockscope><D:exclusive/></D:lockscope>
<D:locktype><D:write/></D:locktype>
</D:lockentry>
<D:lockentry>
<D:lockscope><D:shared/></D:lockscope>
<D:locktype><D:write/></D:locktype>
</D:lockentry>
</D:supportedlock>'
}
fn (p SupportedLock) xml_name() string {
return '<supportedlock/>'
}
fn (p LockDiscovery) xml() string {
return '<D:lockdiscovery>${p}</D:lockdiscovery>'
}
fn (p LockDiscovery) xml_name() string {
return '<lockdiscovery/>'
}
fn format_iso8601(t time.Time) string {
return '${t.year:04d}-${t.month:02d}-${t.day:02d}T${t.hour:02d}:${t.minute:02d}:${t.second:02d}Z'
}

View File

@@ -4,109 +4,148 @@ import encoding.xml
import log
import freeflowuniverse.herolib.core.pathlib
import freeflowuniverse.herolib.vfs
import freeflowuniverse.herolib.vfs.vfs_db
import os
import time
import net.http
import veb
// Property represents a WebDAV property
pub interface Property {
xml() string
xml_name() string
// PropfindRequest represents a parsed PROPFIND request
pub struct PropfindRequest {
pub:
typ PropfindType
props []string // Property names if typ is prop
depth Depth // Depth of the request (0, 1, or -1 for infinity)
xml_content string // Original XML content
}
type DisplayName = string
type GetLastModified = string
type GetContentType = string
type GetContentLength = string
type ResourceType = bool
type CreationDate = string
type SupportedLock = string
type LockDiscovery = string
fn (p []Property) xml() string {
return '<D:propstat>
<D:prop>${p.map(it.xml()).join_lines()}</D:prop>
<D:status>HTTP/1.1 200 OK</D:status>
</D:propstat>'
pub enum Depth {
infinity = -1
zero = 0
one = 1
}
fn (p DisplayName) xml() string {
return '<D:displayname>${p}</D:displayname>'
// PropfindType represents the type of PROPFIND request
pub enum PropfindType {
allprop // Request all properties
propname // Request property names only
prop // Request specific properties
invalid // Invalid request
}
fn (p DisplayName) xml_name() string {
return '<displayname/>'
}
// parse_propfind_xml parses the XML body of a PROPFIND request
pub fn parse_propfind_xml(req http.Request) !PropfindRequest {
fn (p GetLastModified) xml() string {
return '<D:getlastmodified>${p}</D:getlastmodified>'
}
data := req.data
// Parse Depth header
depth_str := req.header.get_custom('Depth') or { '0' }
depth := parse_depth(depth_str)
fn (p GetLastModified) xml_name() string {
return '<getlastmodified/>'
}
if data.len == 0 {
// If no body is provided, default to allprop
return PropfindRequest{
typ: .allprop
depth: depth
xml_content: ''
}
}
fn (p GetContentType) xml() string {
return '<D:getcontenttype>${p}</D:getcontenttype>'
}
doc := xml.XMLDocument.from_string(data) or {
return error('Failed to parse XML: ${err}')
}
fn (p GetContentType) xml_name() string {
return '<getcontenttype/>'
}
root := doc.root
if root.name.to_lower() != 'propfind' && !root.name.ends_with(':propfind') {
return error('Invalid PROPFIND request: root element must be propfind')
}
fn (p GetContentLength) xml() string {
return '<D:getcontentlength>${p}</D:getcontentlength>'
}
mut typ := PropfindType.invalid
mut props := []string{}
// Check for allprop, propname, or prop elements
for child in root.children {
if child is xml.XMLNode {
node := child as xml.XMLNode
// Check for allprop
if node.name == 'allprop' || node.name == 'D:allprop' {
typ = .allprop
break
}
// Check for propname
if node.name == 'propname' || node.name == 'D:propname' {
typ = .propname
break
}
// Check for prop
if node.name == 'prop' || node.name == 'D:prop' {
typ = .prop
// Extract property names
for prop_child in node.children {
if prop_child is xml.XMLNode {
prop_node := prop_child as xml.XMLNode
props << prop_node.name
}
}
break
}
}
}
if typ == .invalid {
return error('Invalid PROPFIND request: missing prop, allprop, or propname element')
}
fn (p GetContentLength) xml_name() string {
return '<getcontentlength/>'
}
fn (p ResourceType) xml() string {
return if p {
'<D:resourcetype><D:collection/></D:resourcetype>'
} else {
'<D:resourcetype/>'
return PropfindRequest{
typ: typ
props: props
depth: depth
xml_content: data
}
}
fn (p ResourceType) xml_name() string {
return '<resourcetype/>'
// parse_depth parses the Depth header value
pub fn parse_depth(depth_str string) Depth {
if depth_str == 'infinity' { return .infinity}
else if depth_str == '0' { return .zero}
else if depth_str == '1' { return .one}
else {
log.warn('[WebDAV] Invalid Depth header value: ${depth_str}, defaulting to infinity')
return .infinity
}
}
fn (p CreationDate) xml() string {
return '<D:creationdate>${p}</D:creationdate>'
// Response represents a WebDAV response for a resource
pub struct Response {
pub:
href string
found_props []Property
not_found_props []Property
}
fn (p CreationDate) xml_name() string {
return '<creationdate/>'
fn (r Response) xml() string {
return '<D:response>\n<D:href>${r.href}</D:href>
<D:propstat><D:prop>${r.found_props.map(it.xml()).join_lines()}</D:prop><D:status>HTTP/1.1 200 OK</D:status></D:propstat>
</D:response>'
}
fn (p SupportedLock) xml() string {
return '<D:supportedlock>
<D:lockentry>
<D:lockscope><D:exclusive/></D:lockscope>
<D:locktype><D:write/></D:locktype>
</D:lockentry>
<D:lockentry>
<D:lockscope><D:shared/></D:lockscope>
<D:locktype><D:write/></D:locktype>
</D:lockentry>
</D:supportedlock>'
// generate_propfind_response generates a PROPFIND response XML string from Response structs
pub fn (r []Response) xml () string {
return '<?xml version="1.0" encoding="UTF-8"?>\n<D:multistatus xmlns:D="DAV:">
${r.map(it.xml()).join_lines()}\n</D:multistatus>'
}
fn (p SupportedLock) xml_name() string {
return '<supportedlock/>'
}
fn get_file_content_type(path string) string {
ext := path.all_after_last('.')
content_type := if v := veb.mime_types[ext] {
v
} else {
'text/plain; charset=utf-8'
}
fn (p LockDiscovery) xml() string {
return '<D:lockdiscovery>${p}</D:lockdiscovery>'
return content_type
}
fn (p LockDiscovery) xml_name() string {
return '<lockdiscovery/>'
}
fn format_iso8601(t time.Time) string {
return '${t.year:04d}-${t.month:02d}-${t.day:02d}T${t.hour:02d}:${t.minute:02d}:${t.second:02d}Z'
}

View File

@@ -8,11 +8,22 @@ import veb
import log
import strings
@['/:path...'; options]
pub fn (app &App) options(mut ctx Context, path string) veb.Result {
@[head]
pub fn (server &Server) index(mut ctx Context) veb.Result {
ctx.set_custom_header('DAV', '1,2') or { return ctx.server_error(err.msg()) }
ctx.set_header(.allow, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
ctx.set_custom_header('MS-Author-Via', 'DAV') or { return ctx.server_error(err.msg()) }
ctx.set_header(.access_control_allow_origin, '*')
ctx.set_header(.access_control_allow_methods, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
ctx.set_header(.access_control_allow_headers, 'Authorization, Content-Type')
ctx.set_header(.content_length, '0')
return ctx.ok('')
}
@['/:path...'; options]
pub fn (server &Server) options(mut ctx Context, path string) veb.Result {
ctx.set_custom_header('DAV', '1,2') or { return ctx.server_error(err.msg()) }
ctx.set_header(.allow, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
// ctx.set_header(.connection, 'close')
ctx.set_custom_header('MS-Author-Via', 'DAV') or { return ctx.server_error(err.msg()) }
ctx.set_header(.access_control_allow_origin, '*')
ctx.set_header(.access_control_allow_methods, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
@@ -22,7 +33,7 @@ pub fn (app &App) options(mut ctx Context, path string) veb.Result {
}
@['/:path...'; lock]
pub fn (mut app App) lock(mut ctx Context, path string) veb.Result {
pub fn (mut server Server) lock(mut ctx Context, path string) veb.Result {
resource := ctx.req.url
// Parse lock information from XML body instead of headers
@@ -52,13 +63,13 @@ pub fn (mut app App) lock(mut ctx Context, path string) veb.Result {
}
// Try to acquire the lock
lock_result := app.lock_manager.lock(new_lock) or {
lock_result := server.lock_manager.lock(new_lock) or {
// If we get here, the resource is locked by a different owner
ctx.res.set_status(.locked)
return ctx.text('Resource is already locked by a different owner.')
}
log.debug('[WebDAV] Received lock result ${lock_result.xml()}')
// log.debug('[WebDAV] Received lock result ${lock_result.xml()}')
ctx.res.set_status(.ok)
ctx.set_custom_header('Lock-Token', '${lock_result.token}') or { return ctx.server_error(err.msg()) }
@@ -67,7 +78,7 @@ pub fn (mut app App) lock(mut ctx Context, path string) veb.Result {
}
@['/:path...'; unlock]
pub fn (mut app App) unlock(mut ctx Context, path string) veb.Result {
pub fn (mut server Server) unlock(mut ctx Context, path string) veb.Result {
resource := ctx.req.url
token_ := ctx.get_custom_header('Lock-Token') or { return ctx.server_error(err.msg()) }
token := token_.trim_string_left('<').trim_string_right('>')
@@ -77,7 +88,7 @@ pub fn (mut app App) unlock(mut ctx Context, path string) veb.Result {
return ctx.text('Lock failed: `Owner` header missing.')
}
if app.lock_manager.unlock_with_token(resource, token) {
if server.lock_manager.unlock_with_token(resource, token) {
ctx.res.set_status(.no_content)
return ctx.text('Lock successfully released')
}
@@ -88,34 +99,23 @@ pub fn (mut app App) unlock(mut ctx Context, path string) veb.Result {
}
@['/:path...'; get]
pub fn (mut app App) get_file(mut ctx Context, path string) veb.Result {
pub fn (mut server Server) get_file(mut ctx Context, path string) veb.Result {
log.info('[WebDAV] Getting file ${path}')
file_data := app.vfs.file_read(path) or { return ctx.server_error(err.msg()) }
file_data := server.vfs.file_read(path) or {
log.error('[WebDAV] ${err.msg()}')
return ctx.server_error(err.msg())
}
ext := path.all_after_last('.')
content_type := veb.mime_types['.${ext}'] or { 'text/plain' }
println('debugzo000 ${file_data.bytestr().len}')
println('debugzo001 ${file_data.len}')
// ctx.res.header.set(.content_length, file_data.len.str())
// ctx.res.set_status(.ok)
return ctx.send_response_to_client(content_type, file_data.bytestr())
}
@[head]
pub fn (app &App) index(mut ctx Context) veb.Result {
ctx.set_custom_header('DAV', '1,2') or { return ctx.server_error(err.msg()) }
ctx.set_header(.allow, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
ctx.set_custom_header('MS-Author-Via', 'DAV') or { return ctx.server_error(err.msg()) }
ctx.set_header(.access_control_allow_origin, '*')
ctx.set_header(.access_control_allow_methods, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
ctx.set_header(.access_control_allow_headers, 'Authorization, Content-Type')
ctx.set_header(.content_length, '0')
return ctx.ok('')
}
@['/:path...'; head]
pub fn (mut app App) exists(mut ctx Context, path string) veb.Result {
pub fn (mut server Server) exists(mut ctx Context, path string) veb.Result {
// Check if the requested path exists in the virtual filesystem
if !app.vfs.exists(path) {
if !server.vfs.exists(path) {
return ctx.not_found()
}
@@ -144,19 +144,18 @@ pub fn (mut app App) exists(mut ctx Context, path string) veb.Result {
}
@['/:path...'; delete]
pub fn (mut app App) delete(mut ctx Context, path string) veb.Result {
app.vfs.delete(path) or {
pub fn (mut server Server) delete(mut ctx Context, path string) veb.Result {
server.vfs.delete(path) or {
return ctx.server_error(err.msg())
}
// Return success response
return ctx.no_content()
}
@['/:path...'; copy]
pub fn (mut app App) copy(mut ctx Context, path string) veb.Result {
if !app.vfs.exists(path) {
pub fn (mut server Server) copy(mut ctx Context, path string) veb.Result {
if !server.vfs.exists(path) {
return ctx.not_found()
}
@@ -169,8 +168,10 @@ pub fn (mut app App) copy(mut ctx Context, path string) veb.Result {
}
destination_path_str := destination_url.path
app.vfs.copy(path, destination_path_str) or {
console.print_stderr('failed to copy: ${err}')
server.vfs.copy(path, destination_path_str) or {
log.set_level(.debug)
println('[WebDAV] Failed to copy: ${err}')
return ctx.server_error(err.msg())
}
@@ -179,8 +180,8 @@ pub fn (mut app App) copy(mut ctx Context, path string) veb.Result {
}
@['/:path...'; move]
pub fn (mut app App) move(mut ctx Context, path string) veb.Result {
if !app.vfs.exists(path) {
pub fn (mut server Server) move(mut ctx Context, path string) veb.Result {
if !server.vfs.exists(path) {
return ctx.not_found()
}
@@ -194,8 +195,8 @@ pub fn (mut app App) move(mut ctx Context, path string) veb.Result {
destination_path_str := destination_url.path
log.info('[WebDAV] ${@FN} from ${path} to ${destination_path_str}')
app.vfs.move(path, destination_path_str) or {
console.print_stderr('failed to move: ${err}')
server.vfs.move(path, destination_path_str) or {
log.error('Failed to move: ${err}')
return ctx.server_error(err.msg())
}
@@ -204,14 +205,14 @@ pub fn (mut app App) move(mut ctx Context, path string) veb.Result {
}
@['/:path...'; mkcol]
pub fn (mut app App) mkcol(mut ctx Context, path string) veb.Result {
if app.vfs.exists(path) {
pub fn (mut server Server) mkcol(mut ctx Context, path string) veb.Result {
if server.vfs.exists(path) {
ctx.res.set_status(.bad_request)
return ctx.text('Another collection exists at ${path}')
}
log.info('[WebDAV] Make Collection ${path}')
app.vfs.dir_create(path) or {
server.vfs.dir_create(path) or {
console.print_stderr('failed to create directory ${path}: ${err}')
return ctx.server_error(err.msg())
}
@@ -220,51 +221,10 @@ pub fn (mut app App) mkcol(mut ctx Context, path string) veb.Result {
return ctx.text('HTTP 201: Created')
}
@['/:path...'; propfind]
fn (mut app App) propfind(mut ctx Context, path string) veb.Result {
// Parse PROPFIND request
propfind_req := parse_propfind_xml(ctx.req) or {
return ctx.error(WebDAVError{
status: .bad_request
message: 'Failed to parse PROPFIND XML: ${err}'
tag: 'propfind-parse-error'
})
}
log.debug('[WebDAV] Propfind Request: ${propfind_req.typ} ${propfind_req.depth}')
// Check if resource is locked
if app.lock_manager.is_locked(ctx.req.url) {
// If the resource is locked, we should still return properties
// but we might need to indicate the lock status in the response
// This is handled in the property generation
log.info('[WebDAV] Resource is locked: ${ctx.req.url}')
}
entry := app.vfs.get(path) or {
return ctx.error(
status: .not_found
message: 'Path ${path} does not exist'
tag: 'resource-must-be-null'
)
}
responses := app.get_responses(entry, propfind_req) or {
return ctx.server_error('Failed to get entry properties ${err}')
}
// log.debug('[WebDAV] Propfind responses ${responses}')
// Create multistatus response using the responses
ctx.res.set_status(.multi_status)
return ctx.send_response_to_client('application/xml', responses.xml())
}
@['/:path...'; put]
fn (mut app App) create_or_update(mut ctx Context, path string) veb.Result {
if app.vfs.exists(path) {
if fs_entry := app.vfs.get(path) {
fn (mut server Server) create_or_update(mut ctx Context, path string) veb.Result {
if server.vfs.exists(path) {
if fs_entry := server.vfs.get(path) {
if fs_entry.is_dir() {
console.print_stderr('Cannot PUT to a directory: ${path}')
ctx.res.set_status(.method_not_allowed)
@@ -274,12 +234,12 @@ fn (mut app App) create_or_update(mut ctx Context, path string) veb.Result {
return ctx.server_error('failed to get FS Entry ${path}: ${err.msg()}')
}
} else {
app.vfs.file_create(path) or { return ctx.server_error(err.msg()) }
server.vfs.file_create(path) or { return ctx.server_error(err.msg()) }
}
if ctx.req.data.len > 0 {
data := ctx.req.data.bytes()
app.vfs.file_write(path, data) or { return ctx.server_error(err.msg()) }
server.vfs.file_write(path, data) or { return ctx.server_error(err.msg()) }
return ctx.ok('HTTP 200: Successfully wrote file: ${path}')
}
return ctx.ok('HTTP 200: Successfully created file: ${path}')
}
}

View File

@@ -0,0 +1,102 @@
module webdav
import encoding.xml
import log
import freeflowuniverse.herolib.core.pathlib
import freeflowuniverse.herolib.vfs
import freeflowuniverse.herolib.vfs.vfs_db
import os
import time
import net.http
import veb
@['/:path...'; propfind]
fn (mut server Server) propfind(mut ctx Context, path string) veb.Result {
// Parse PROPFIND request
propfind_req := parse_propfind_xml(ctx.req) or {
return ctx.error(WebDAVError{
status: .bad_request
message: 'Failed to parse PROPFIND XML: ${err}'
tag: 'propfind-parse-error'
})
}
log.debug('[WebDAV] Propfind Request: ${propfind_req.typ} ${propfind_req.depth}')
// Check if resource is locked
if server.lock_manager.is_locked(ctx.req.url) {
// If the resource is locked, we should still return properties
// but we might need to indicate the lock status in the response
// This is handled in the property generation
log.info('[WebDAV] Resource is locked: ${ctx.req.url}')
}
entry := server.vfs.get(path) or {
return ctx.error(
status: .not_found
message: 'Path ${path} does not exist'
tag: 'resource-must-be-null'
)
}
responses := server.get_responses(entry, propfind_req, path) or {
return ctx.server_error('Failed to get entry properties ${err}')
}
// log.debug('[WebDAV] Propfind responses ${responses}')
// Create multistatus response using the responses
ctx.res.set_status(.multi_status)
return ctx.send_response_to_client('application/xml', responses.xml())
}
// get_responses returns all properties for the given path and depth
fn (mut server Server) get_responses(entry vfs.FSEntry, req PropfindRequest, path string) ![]Response {
mut responses := []Response{}
// path := server.vfs.get_path(entry)!
// main entry response
responses << Response {
href: path
// not_found: entry.get_unfound_properties(req)
found_props: server.get_properties(entry)
}
if !entry.is_dir() || req.depth == .zero {
return responses
}
entries := server.vfs.dir_list(path) or {
log.error('Failed to list directory for ${path} ${err}')
return responses }
for e in entries {
responses << server.get_responses(e, PropfindRequest {
...req,
depth: if req.depth == .one { .zero } else { .infinity }
}, '${path.trim_string_right("/")}/${e.get_metadata().name}')!
}
return responses
}
// returns the properties of a filesystem entry
fn (mut server Server) get_properties(entry &vfs.FSEntry) []Property {
mut props := []Property{}
metadata := entry.get_metadata()
// Display name
props << DisplayName(metadata.name)
props << GetLastModified(format_iso8601(metadata.modified_time()))
props << GetContentType(if entry.is_dir() {'httpd/unix-directory'} else {get_file_content_type(entry.get_metadata().name)})
props << ResourceType(entry.is_dir())
// Content length (only for files)
if !entry.is_dir() {
props << GetContentLength(metadata.size.str())
}
// Creation date
props << CreationDate(format_iso8601(metadata.created_time()))
return props
}

View File

@@ -1,214 +1,554 @@
module webdav
import net.http
import freeflowuniverse.herolib.core.pathlib
import freeflowuniverse.herolib.vfs.vfs_db
import freeflowuniverse.herolib.data.ourdb
import encoding.xml
import os
import time
import encoding.base64
import rand
import veb
import net.http
import log
fn test_run() {
mut app := new_app(
user_db: {
'mario': '123'
}
)!
spawn app.run()
fn testsuite_begin() {
log.set_level(.debug)
}
// fn test_get() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
// time.sleep(1 * time.second)
// file_name := 'newfile.txt'
// mut p := pathlib.get_file(path: '${root_dir}/${file_name}', create: true)!
// p.write('my new file')!
const testdata_path := os.join_path(os.dir(@FILE), 'testdata')
const database_path := os.join_path(testdata_path, 'database')
// mut req := http.new_request(.get, 'http://localhost:${app.server_port}/${file_name}',
// '')
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// Helper function to create a test server and DatabaseVFS
fn setup_test_server(function string) !(&vfs_db.DatabaseVFS, &Server) {
if !os.exists(testdata_path) {
os.mkdir_all(testdata_path) or { return error('Failed to create testdata directory: ${err}') }
}
if !os.exists(database_path) {
os.mkdir_all(database_path) or { return error('Failed to create database directory: ${err}') }
}
mut metadata_db := ourdb.new(path: os.join_path(database_path, '${function}/metadata'))!
mut data_db := ourdb.new(path: os.join_path(database_path, '${function}/data'))!
mut vfs := vfs_db.new(mut metadata_db, mut data_db)!
// Create a test server
mut server := new_server(vfs: vfs, user_db: {
'admin': '123'
})!
return vfs, server
}
// response := req.do()!
// assert response.body == 'my new file'
// }
// Helper function to create a test file in the DatabaseVFS
fn create_test_file(mut vfs vfs_db.DatabaseVFS, path string, content string) ! {
vfs.file_write(path, content.bytes())!
}
// fn test_put() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
// time.sleep(1 * time.second)
// file_name := 'newfile_put.txt'
// Helper function to create a test directory in the DatabaseVFS
fn create_test_directory(mut vfs vfs_db.DatabaseVFS, path string) ! {
vfs.dir_create(path)!
}
// mut data := 'my new put file'
// mut req := http.new_request(.put, 'http://localhost:${app.server_port}/${file_name}',
// data)
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// mut response := req.do()!
fn test_server_run() ! {
_, mut server := setup_test_server(@FILE)!
spawn server.run()
time.sleep(100 * time.millisecond)
}
// mut p := pathlib.get_file(path: '${root_dir}/${file_name}')!
fn test_server_index() ! {
_, mut server := setup_test_server(@FILE)!
mut ctx := Context{
req: http.Request{
method: http.Method.head
url: '/'
}
res: http.Response{}
}
server.index(mut ctx)
assert ctx.res.status() == http.Status.ok
assert ctx.res.header.get_custom('DAV')! == '1,2'
assert ctx.res.header.get(.allow)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
assert ctx.res.header.get_custom('MS-Author-Via')! == 'DAV'
assert ctx.res.header.get(.access_control_allow_origin)! == '*'
assert ctx.res.header.get(.access_control_allow_methods)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
assert ctx.res.header.get(.access_control_allow_headers)! == 'Authorization, Content-Type'
assert ctx.res.header.get(.content_length)! == '0'
}
// assert p.exists()
// assert p.read()! == data
fn test_server_options() ! {
_, mut server := setup_test_server(@FILE)!
mut ctx := Context{
req: http.Request{
method: http.Method.options
url: '/test_path'
}
res: http.Response{}
}
server.options(mut ctx, 'test_path')
assert ctx.res.status() == http.Status.ok
assert ctx.res.header.get_custom('DAV')! == '1,2'
assert ctx.res.header.get(.allow)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
assert ctx.res.header.get_custom('MS-Author-Via')! == 'DAV'
assert ctx.res.header.get(.access_control_allow_origin)! == '*'
assert ctx.res.header.get(.access_control_allow_methods)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
assert ctx.res.header.get(.access_control_allow_headers)! == 'Authorization, Content-Type'
assert ctx.res.header.get(.content_length)! == '0'
}
// data = 'updated data'
// req = http.new_request(.put, 'http://localhost:${app.server_port}/${file_name}', data)
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// response = req.do()!
fn test_server_lock() ! {
_, mut server := setup_test_server(@FILE)!
// Create a test file to lock
test_path := 'test_lock_file.txt'
// Prepare lock XML request body
lock_xml := '<?xml version="1.0" encoding="utf-8"?>
<D:lockinfo xmlns:D="DAV:">
<D:lockscope><D:exclusive/></D:lockscope>
<D:locktype><D:write/></D:locktype>
<D:owner>
<D:href>test-user</D:href>
</D:owner>
</D:lockinfo>'
mut ctx := Context{
req: http.Request{
method: http.Method.lock
url: '/${test_path}'
data: lock_xml
header: http.Header{}
}
res: http.Response{}
}
// Set headers
ctx.req.header.add_custom('Depth', '0')!
ctx.req.header.add_custom('Timeout', 'Second-3600')!
server.lock(mut ctx, test_path)
// Check response
assert ctx.res.status() == http.Status.ok
assert ctx.res.header.get_custom('Lock-Token')! != ''
assert ctx.res.header.get(.content_type)! == 'application/xml'
// Verify response contains proper lock XML
assert ctx.res.body.len > 0
assert ctx.res.body.contains('<D:lockdiscovery')
assert ctx.res.body.contains('<D:activelock>')
}
// p = pathlib.get_file(path: '${root_dir}/${file_name}')!
fn test_server_unlock() ! {
_, mut server := setup_test_server(@FILE)!
// Create a test file
test_path := 'test_unlock_file.txt'
// First lock the resource
lock_xml := '<?xml version="1.0" encoding="utf-8"?>
<D:lockinfo xmlns:D="DAV:">
<D:lockscope><D:exclusive/></D:lockscope>
<D:locktype><D:write/></D:locktype>
<D:owner>
<D:href>test-user</D:href>
</D:owner>
</D:lockinfo>'
mut lock_ctx := Context{
req: http.Request{
method: http.Method.lock
url: '/${test_path}'
data: lock_xml
header: http.Header{}
}
res: http.Response{}
}
lock_ctx.req.header.add_custom('Depth', '0')!
lock_ctx.req.header.add_custom('Timeout', 'Second-3600')!
server.lock(mut lock_ctx, test_path)
// Extract lock token from response
lock_token := lock_ctx.res.header.get_custom('Lock-Token')!
// Now unlock the resource
mut unlock_ctx := Context{
req: http.Request{
method: http.Method.unlock
url: '/${test_path}'
header: http.Header{}
}
res: http.Response{}
}
unlock_ctx.req.header.add_custom('Lock-Token', lock_token)!
server.unlock(mut unlock_ctx, test_path)
// Check response
assert unlock_ctx.res.status() == http.Status.no_content
}
// assert p.exists()
// assert p.read()! == data
// }
fn test_server_get_file() ! {
mut vfs, mut server := setup_test_server(@FN)!
// Create a test file
test_path := 'test_get_file.txt'
test_content := 'This is a test file content'
create_test_file(mut vfs, test_path, test_content)!
mut ctx := Context{
req: http.Request{
method: http.Method.get
url: '/${test_path}'
}
res: http.Response{}
}
server.get_file(mut ctx, test_path)
// Check response
assert ctx.res.status() == http.Status.ok
assert ctx.res.header.get(.content_type)! == 'text/plain'
assert ctx.res.body == test_content
}
// fn test_copy() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
fn test_server_exists() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Create a test file
test_path := 'test_exists_file.txt'
test_content := 'This is a test file content'
create_test_file(mut vfs, test_path, test_content)!
// Test for existing file
mut ctx := Context{
req: http.Request{
method: http.Method.head
url: '/${test_path}'
}
res: http.Response{}
}
server.exists(mut ctx, test_path)
// Check response for existing file
assert ctx.res.status() == http.Status.ok
assert ctx.res.header.get_custom('dav')! == '1, 2'
assert ctx.res.header.get(.content_length)! == '0'
assert ctx.res.header.get_custom('Allow')!.contains('OPTIONS')
assert ctx.res.header.get(.accept_ranges)! == 'bytes'
// Test for non-existing file
mut ctx2 := Context{
req: http.Request{
method: http.Method.head
url: '/nonexistent_file.txt'
}
res: http.Response{}
}
server.exists(mut ctx2, 'nonexistent_file.txt')
// Check response for non-existing file
assert ctx2.res.status() == http.Status.not_found
}
// time.sleep(1 * time.second)
// file_name1, file_name2 := 'newfile_copy1.txt', 'newfile_copy2.txt'
// mut p1 := pathlib.get_file(path: '${root_dir}/${file_name1}', create: true)!
// data := 'file copy data'
// p1.write(data)!
fn test_server_delete() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Create a test file
test_path := 'test_delete_file.txt'
test_content := 'This is a test file to delete'
create_test_file(mut vfs, test_path, test_content)!
// Verify file exists
assert vfs.exists(test_path)
mut ctx := Context{
req: http.Request{
method: http.Method.delete
url: '/${test_path}'
}
res: http.Response{}
}
server.delete(mut ctx, test_path)
// Check response
assert ctx.res.status() == http.Status.no_content
// Verify file was deleted
assert !vfs.exists(test_path)
}
// mut req := http.new_request(.copy, 'http://localhost:${app.server_port}/${file_name1}',
// '')
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// req.add_custom_header('Destination', 'http://localhost:${app.server_port}/${file_name2}')!
// mut response := req.do()!
fn test_server_copy() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Create a test file
source_path := 'test_copy_source.txt'
dest_path := 'test_copy_dest.txt'
test_content := 'This is a test file to copy'
create_test_file(mut vfs, source_path, test_content)!
mut ctx := Context{
req: http.Request{
method: http.Method.copy
url: '/${source_path}'
header: http.Header{}
}
res: http.Response{}
}
// Set Destination header
ctx.req.header.add_custom('Destination', 'http://localhost/${dest_path}')!
log.set_level(.debug)
server.copy(mut ctx, source_path)
// Check response
assert ctx.res.status() == http.Status.ok
// Verify destination file exists and has the same content
assert vfs.exists(dest_path)
dest_content := vfs.file_read(dest_path) or { panic(err) }
assert dest_content.bytestr() == test_content
}
// assert p1.exists()
// mut p2 := pathlib.get_file(path: '${root_dir}/${file_name2}')!
// assert p2.exists()
// assert p2.read()! == data
// }
fn test_server_move() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Create a test file
source_path := 'test_move_source.txt'
dest_path := 'test_move_dest.txt'
test_content := 'This is a test file to move'
create_test_file(mut vfs, source_path, test_content)!
mut ctx := Context{
req: http.Request{
method: http.Method.move
url: '/${source_path}'
header: http.Header{}
}
res: http.Response{}
}
// Set Destination header
ctx.req.header.add_custom('Destination', 'http://localhost/${dest_path}')!
server.move(mut ctx, source_path)
// Check response
assert ctx.res.status() == http.Status.ok
// Verify source file no longer exists
assert !vfs.exists(source_path)
// Verify destination file exists and has the same content
assert vfs.exists(dest_path)
dest_content := vfs.file_read(dest_path) or { panic(err) }
assert dest_content.bytestr() == test_content
}
// fn test_move() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
fn test_server_mkcol() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Test directory path
test_dir := 'test_mkcol_dir'
mut ctx := Context{
req: http.Request{
method: http.Method.mkcol
url: '/${test_dir}'
}
res: http.Response{}
}
server.mkcol(mut ctx, test_dir)
// Check response
assert ctx.res.status() == http.Status.created
// Verify directory was created
assert vfs.exists(test_dir)
dir_entry := vfs.get(test_dir) or { panic(err) }
assert dir_entry.is_dir()
// Test creating a collection that already exists
mut ctx2 := Context{
req: http.Request{
method: http.Method.mkcol
url: '/${test_dir}'
}
res: http.Response{}
}
server.mkcol(mut ctx2, test_dir)
// Should return bad request for existing collection
assert ctx2.res.status() == http.Status.bad_request
}
// time.sleep(1 * time.second)
// file_name1, file_name2 := 'newfile_move1.txt', 'newfile_move2.txt'
// mut p := pathlib.get_file(path: '${root_dir}/${file_name1}', create: true)!
// data := 'file move data'
// p.write(data)!
fn test_server_put() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Test file path
test_file := 'test_put_file.txt'
test_content := 'This is content for PUT test'
mut ctx := Context{
req: http.Request{
method: http.Method.put
url: '/${test_file}'
data: test_content
}
res: http.Response{}
}
server.create_or_update(mut ctx, test_file)
// Check response
assert ctx.res.status() == http.Status.ok
// Verify file was created with correct content
assert vfs.exists(test_file)
file_content := vfs.file_read(test_file) or { panic(err) }
assert file_content.bytestr() == test_content
// Test updating existing file
new_content := 'Updated content for PUT test'
mut ctx2 := Context{
req: http.Request{
method: http.Method.put
url: '/${test_file}'
data: new_content
}
res: http.Response{}
}
server.create_or_update(mut ctx2, test_file)
// Check response
assert ctx2.res.status() == http.Status.ok
// Verify file was updated with new content
updated_content := vfs.file_read(test_file) or { panic(err) }
assert updated_content.bytestr() == new_content
}
// mut req := http.new_request(.move, 'http://localhost:${app.server_port}/${file_name1}',
// '')
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// req.add_custom_header('Destination', 'http://localhost:${app.server_port}/${file_name2}')!
// mut response := req.do()!
// p = pathlib.get_file(path: '${root_dir}/${file_name2}')!
// assert p.exists()
// assert p.read()! == data
// }
// fn test_delete() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
// time.sleep(1 * time.second)
// file_name := 'newfile_delete.txt'
// mut p := pathlib.get_file(path: '${root_dir}/${file_name}', create: true)!
// mut req := http.new_request(.delete, 'http://localhost:${app.server_port}/${file_name}',
// '')
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// mut response := req.do()!
// assert !p.exists()
// }
// fn test_mkcol() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
// time.sleep(1 * time.second)
// dir_name := 'newdir'
// mut req := http.new_request(.mkcol, 'http://localhost:${app.server_port}/${dir_name}',
// '')
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// mut response := req.do()!
// mut p := pathlib.get_dir(path: '${root_dir}/${dir_name}')!
// assert p.exists()
// }
// fn test_propfind() {
// root_dir := '/tmp/webdav'
// mut app := new_app(
// server_port: rand.int_in_range(8000, 9000)!
// root_dir: root_dir
// user_db: {
// 'mario': '123'
// }
// )!
// app.run(background: true)
// time.sleep(1 * time.second)
// dir_name := 'newdir'
// file1 := 'file1.txt'
// file2 := 'file2.html'
// dir1 := 'dir1'
// mut p := pathlib.get_dir(path: '${root_dir}/${dir_name}', create: true)!
// mut file1_p := pathlib.get_file(path: '${p.path}/${file1}', create: true)!
// mut file2_p := pathlib.get_file(path: '${p.path}/${file2}', create: true)!
// mut dir1_p := pathlib.get_dir(path: '${p.path}/${dir1}', create: true)!
// mut req := http.new_request(.propfind, 'http://localhost:${app.server_port}/${dir_name}',
// '')
// signature := base64.encode_str('mario:123')
// req.add_custom_header('Authorization', 'Basic ${signature}')!
// mut response := req.do()!
// assert response.status_code == 207
// }
fn test_server_propfind() ! {
mut vfs, mut server := setup_test_server(@FILE)!
// Create test directory and file structure
root_dir := 'propfind_test'
file_in_root := '${root_dir}/test_file.txt'
subdir := '${root_dir}/subdir'
file_in_subdir := '${subdir}/subdir_file.txt'
create_test_directory(mut vfs, root_dir)!
create_test_file(mut vfs, file_in_root, 'Test file content')!
create_test_directory(mut vfs, subdir)!
create_test_file(mut vfs, file_in_subdir, 'Subdir file content')!
// Test PROPFIND with depth=0 (just the resource)
propfind_xml := '<?xml version="1.0" encoding="utf-8"?>
<D:propfind xmlns:D="DAV:">
<D:allprop/>
</D:propfind>'
mut ctx := Context{
req: http.Request{
method: http.Method.propfind
url: '/${root_dir}'
data: propfind_xml
header: http.Header{}
}
res: http.Response{}
}
// Set Depth header to 0
ctx.req.header.add_custom('Depth', '0')!
server.propfind(mut ctx, root_dir)
// Check response
assert ctx.res.status() == http.Status.multi_status
assert ctx.res.header.get(.content_type)! == 'application/xml'
assert ctx.res.body.contains('<D:multistatus')
assert ctx.res.body.contains('<D:response>')
assert ctx.res.body.contains('<D:href>${root_dir}</D:href>')
// Should only include the requested resource
assert !ctx.res.body.contains('<D:href>${file_in_root}</D:href>')
// Test PROPFIND with depth=1 (resource and immediate children)
mut ctx2 := Context{
req: http.Request{
method: http.Method.propfind
url: '/${root_dir}'
data: propfind_xml
header: http.Header{}
}
res: http.Response{}
}
// Set Depth header to 1
ctx2.req.header.add_custom('Depth', '1')!
server.propfind(mut ctx2, root_dir)
// Check response
assert ctx2.res.status() == http.Status.multi_status
assert ctx2.res.body.contains('<D:multistatus')
// Should include the resource and immediate children
assert ctx2.res.body.contains('<D:href>${root_dir}</D:href>')
assert ctx2.res.body.contains('<D:href>${file_in_root}</D:href>')
assert ctx2.res.body.contains('<D:href>${subdir}</D:href>')
// But not grandchildren
assert !ctx2.res.body.contains('<D:href>${file_in_subdir}</D:href>')
// Test PROPFIND with depth=infinity (all descendants)
mut ctx3 := Context{
req: http.Request{
method: http.Method.propfind
url: '/${root_dir}'
data: propfind_xml
header: http.Header{}
}
res: http.Response{}
}
// Set Depth header to infinity
ctx3.req.header.add_custom('Depth', 'infinity')!
server.propfind(mut ctx3, root_dir)
// Check response
assert ctx3.res.status() == http.Status.multi_status
// Should include all descendants
assert ctx3.res.body.contains('<D:href>${root_dir}</D:href>')
assert ctx3.res.body.contains('<D:href>${file_in_root}</D:href>')
assert ctx3.res.body.contains('<D:href>${subdir}</D:href>')
assert ctx3.res.body.contains('<D:href>${file_in_subdir}</D:href>')
// Test PROPFIND for non-existent resource
mut ctx4 := Context{
req: http.Request{
method: http.Method.propfind
url: '/nonexistent'
data: propfind_xml
header: http.Header{}
}
res: http.Response{}
}
ctx4.req.header.add_custom('Depth', '0')!
server.propfind(mut ctx4, 'nonexistent')
// Should return not found
assert ctx4.res.status() == http.Status.not_found
}

View File

@@ -32,6 +32,9 @@ mut:
move(src_path string, dst_path string) !FSEntry
delete(path string) !
// FSEntry Operations
get_path(entry &FSEntry) !string
// Cleanup operation
destroy() !
}
@@ -39,7 +42,7 @@ mut:
// FSEntry represents a filesystem entry (file, directory, or symlink)
pub interface FSEntry {
get_metadata() Metadata
get_path() string
// get_path() string
is_dir() bool
is_file() bool
is_symlink() bool

View File

@@ -7,7 +7,6 @@ pub struct Metadata {
pub mut:
id u32 @[required] // unique identifier used as key in DB
name string @[required] // name of file or directory
path string @[required] // path of file or directory
file_type FileType
size u64
created_at i64 // unix epoch timestamp

View File

@@ -35,26 +35,30 @@ pub fn (mut fs DatabaseVFS) get_next_id() u32 {
// load_entry loads an entry from the database by ID and sets up parent references
// loads without data
fn (mut fs DatabaseVFS) load_entry(vfs_id u32) !FSEntry {
if metadata := fs.db_metadata.get(fs.get_database_id(vfs_id)!) {
match decode_entry_type(metadata)! {
.directory {
mut dir := decode_directory(metadata) or {
return error('Failed to decode directory: ${err}')
if db_id := fs.id_table[vfs_id] {
if metadata := fs.db_metadata.get(db_id) {
match decode_entry_type(metadata)! {
.directory {
mut dir := decode_directory(metadata) or {
return error('Failed to decode directory: ${err}')
}
return dir
}
return dir
}
.file {
return decode_file_metadata(metadata) or { return error('Failed to decode file: ${err}') }
}
.symlink {
mut symlink := decode_symlink(metadata) or {
return error('Failed to decode symlink: ${err}')
.file {
return decode_file_metadata(metadata) or { return error('Failed to decode file: ${err}') }
}
.symlink {
mut symlink := decode_symlink(metadata) or {
return error('Failed to decode symlink: ${err}')
}
return symlink
}
return symlink
}
} else {
return error('Entry ${vfs_id} not found ${err}')
}
} else {
return error('Entry ${vfs_id} not found ${err}')
return error('Entry ${vfs_id} not found')
}
}
@@ -74,4 +78,102 @@ fn (mut fs DatabaseVFS) load_entry(vfs_id u32) !FSEntry {
// }
// }
// return file_data
// }
// }
fn (mut self DatabaseVFS) get_entry(path string) !FSEntry {
if path == '/' || path == '' || path == '.' {
return FSEntry(self.root_get_as_dir()!)
}
parts := path.trim_string_left('/').split('/')
mut parent_dir := *self.root_get_as_dir()!
for i, part in parts {
entry := self.directory_get_entry(parent_dir, part) or {
return error('Failed to get entry ${err}')
}
if i == parts.len - 1 {
// last part, means entry is found
return entry
}
if entry is Directory {
parent_dir = entry
} else {
return error('Failed to get entry, expected dir')
}
}
// mut current := *self.root_get_as_dir()!
// return self.directory_get_entry(mut current, path) or {
return error('Path not found: ${path}')
// }
}
// internal function to get an entry of some name from a directory
fn (mut self DatabaseVFS) directory_get_entry(dir Directory, name string) ?FSEntry {
// mut children := self.directory_children(mut dir, false) or {
// panic('this should never happen')
// }
for child_id in dir.children {
if entry := self.load_entry(child_id) {
if entry.metadata.name == name {
return entry
}
} else {
panic('Filesystem is corrupted, this should never happen ${err}')
}
}
return none
}
fn (mut self DatabaseVFS) get_directory(path string) !&Directory {
mut entry := self.get_entry(path)!
if mut entry is Directory {
return &entry
}
return error('Not a directory: ${path}')
}
pub fn (mut self DatabaseVFS) get_path(entry_ &vfs.FSEntry) !string {
// entry := self.load_entry(entry_.metadata.)
// entry.parent_id == 0 {
// return '/${entry.metadata.name}'
// } else {
// parent := self.load_entry(entry.parent_id)!
// return '${self.get_path(parent)!}/${entry.metadata.name}'
// }
return ''
}
// Implementation of VFSImplementation interface
pub fn (mut fs DatabaseVFS) root_get_as_dir() !&Directory {
// Try to load root directory from DB if it exists
if db_id := fs.id_table[fs.root_id] {
if data := fs.db_metadata.get(db_id) {
mut loaded_root := decode_directory(data) or {
panic('Failed to decode root directory: ${err}')
}
return &loaded_root
}
}
// Create and save new root directory
mut myroot := Directory{
metadata: vfs.Metadata{
id: fs.get_next_id()
file_type: .directory
name: ''
created_at: time.now().unix()
modified_at: time.now().unix()
accessed_at: time.now().unix()
mode: 0o755 // default directory permissions
owner: 'user' // TODO: get from system
group: 'user' // TODO: get from system
}
parent_id: 0
}
fs.save_entry(myroot) or {return error('failed to set root ${err}')}
fs.root_id = myroot.metadata.id
return &myroot
}

View File

@@ -12,12 +12,10 @@ fn setup_vfs() !(&DatabaseVFS, string) {
// Create separate databases for data and metadata
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
// Create VFS with separate databases for data and metadata

View File

@@ -8,39 +8,42 @@ import time
import log
// save_entry saves an entry to the database
pub fn (mut fs DatabaseVFS) save_entry(entry FSEntry) !u32 {
pub fn (mut fs DatabaseVFS) save_entry(entry FSEntry) ! {
match entry {
Directory {
encoded := entry.encode()
db_id := fs.db_metadata.set(id: entry.metadata.id, data: encoded) or {
db_id := fs.db_metadata.set(data: encoded) or {
return error('Failed to save directory on id:${entry.metadata.id}: ${err}')
}
for child_id in entry.children {
_ := fs.db_metadata.get(fs.get_database_id(child_id)!) or {
return error('Failed to get entry for directory child ${child_id} missing.\n${err}')
}
}
log.debug('[DatabaseVFS] Saving dir entry with children ${entry.children}')
fs.set_database_id(entry.metadata.id, db_id)!
return entry.metadata.id
fs.id_table[entry.metadata.id] = db_id
// for child_id in entry.children {
// if db_id := fs.id_table[child_id] {
// _ := fs.db_metadata.get(fs.get_database_id(child_id)!) or {
// return error('Failed to get entry for directory child ${child_id} missing.\n${err}')
// }
// log.debug('[DatabaseVFS] Saving dir entry with children ${entry.children}')
// fs.set_database_id(entry.metadata.id, db_id)!
// return entry.metadata.id
// } else {
// return error('Failed to get entry for directory child ${child_id} missing.\n${err}')
// }
// }
}
File {
metadata_bytes := entry.encode()
// Save the metadata_bytes to metadata_db
metadata_db_id := fs.db_metadata.set(id: entry.metadata.id, data: metadata_bytes) or {
metadata_db_id := fs.db_metadata.set(data: metadata_bytes) or {
return error('Failed to save file metadata on id:${entry.metadata.id}: ${err}')
}
fs.set_database_id(entry.metadata.id, metadata_db_id)!
return entry.metadata.id
fs.id_table[entry.metadata.id] = metadata_db_id
}
Symlink {
encoded := entry.encode()
db_id := fs.db_metadata.set(id: entry.metadata.id, data: encoded) or {
db_id := fs.db_metadata.set(data: encoded) or {
return error('Failed to save symlink on id:${entry.metadata.id}: ${err}')
}
fs.set_database_id(entry.metadata.id, db_id)!
return entry.metadata.id
fs.id_table[entry.metadata.id] = db_id
}
}
}
@@ -64,15 +67,15 @@ pub fn (mut fs DatabaseVFS) save_file(file_ File, data []u8) !u32 {
if data.len > 0 {
// file has data so that will be stored in data_db
// split data_encoded into chunks of 64 kb
chunks := arrays.chunk(data, 64 * 1024)
chunks := arrays.chunk(data, (64 * 1024) - 1)
mut chunk_ids := []u32{}
for i, chunk in chunks {
// Generate a unique ID for each chunk based on the file ID
chunk_id := file_id * 1000 + u32(i) + 1
chunk_ids << fs.db_data.set(id: chunk_id, data: chunk) or {
chunk_ids << fs.db_data.set(data: chunk) or {
return error('Failed to save file data on id:${file.metadata.id}: ${err}')
}
log.debug('[DatabaseVFS] Saving chunk ${chunk_ids}')
}
// Update the file with chunk IDs and size
@@ -89,10 +92,10 @@ pub fn (mut fs DatabaseVFS) save_file(file_ File, data []u8) !u32 {
// Encode the file with all its metadata
metadata_bytes := updated_file.encode()
// Save the metadata_bytes to metadata_db
metadata_db_id := fs.db_metadata.set(id: file.metadata.id, data: metadata_bytes) or {
metadata_db_id := fs.db_metadata.set(data: metadata_bytes) or {
return error('Failed to save file metadata on id:${file.metadata.id}: ${err}')
}
fs.set_database_id(file.metadata.id, metadata_db_id)!
fs.id_table[file.metadata.id] = metadata_db_id
return file.metadata.id
}

View File

@@ -120,7 +120,6 @@ pub fn decode_symlink(data []u8) !Symlink {
fn decode_metadata(mut d encoder.Decoder) !vfs.Metadata {
id := d.get_u32()!
name := d.get_string()!
path := d.get_string()!
file_type_byte := d.get_u8()!
size := d.get_u64()!
created_at := d.get_i64()!
@@ -133,7 +132,6 @@ fn decode_metadata(mut d encoder.Decoder) !vfs.Metadata {
return vfs.Metadata{
id: id
name: name
path: path
file_type: unsafe { vfs.FileType(file_type_byte) }
size: size
created_at: created_at

View File

@@ -7,7 +7,6 @@ import freeflowuniverse.herolib.vfs
fn encode_metadata(mut e encoder.Encoder, m vfs.Metadata) {
e.add_u32(m.id)
e.add_string(m.name)
e.add_string(m.path)
e.add_u8(u8(m.file_type)) // FileType enum as u8
e.add_u64(m.size)
e.add_i64(m.created_at)

View File

@@ -11,7 +11,6 @@ fn test_directory_encoder_decoder() ! {
dir := Directory{
metadata: vfs.Metadata{
id: u32(current_time)
path: '/root'
name: 'root'
file_type: .directory
created_at: current_time
@@ -54,7 +53,6 @@ fn test_file_encoder_decoder() ! {
metadata: vfs.Metadata{
id: u32(current_time)
name: 'test.txt'
path: '/test.txt'
file_type: .file
size: 13 // Size of 'Hello, world!'
created_at: current_time
@@ -96,7 +94,6 @@ fn test_symlink_encoder_decoder() ! {
metadata: vfs.Metadata{
id: u32(current_time)
name: 'test.txt'
path: '/test.txt'
file_type: .symlink
created_at: current_time
modified_at: current_time

View File

@@ -1,19 +0,0 @@
module vfs_db
import freeflowuniverse.herolib.vfs
import freeflowuniverse.herolib.data.ourdb
import time
// get_database_id get's the corresponding db id for a file's metadata id.
// since multiple vfs can use single db, or db's can have their own id logic
// databases set independent id's to data
pub fn (fs DatabaseVFS) get_database_id(vfs_id u32) !u32 {
return fs.id_table[vfs_id] or { error('VFS ID ${vfs_id} not found.') }
}
// get_database_id get's the corresponding db id for a file's metadata id.
// since multiple vfs can use single db, or db's can have their own id logic
// databases set independent id's to data
pub fn (mut fs DatabaseVFS) set_database_id(vfs_id u32, db_id u32) ! {
fs.id_table[vfs_id] = db_id
}

View File

@@ -1,77 +0,0 @@
module vfs_db
import os
import freeflowuniverse.herolib.data.ourdb
import rand
fn setup_vfs() !&DatabaseVFS {
test_data_dir := os.join_path(os.temp_dir(), 'vfsourdb_id_table_test_${rand.string(3)}')
os.mkdir_all(test_data_dir)!
// Create separate databases for data and metadata
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
// Create VFS with separate databases for data and metadata
mut vfs := new(mut db_data, mut db_metadata)!
return vfs
}
fn test_set_get_database_id() ! {
mut vfs := setup_vfs()!
// Test setting and getting database IDs
vfs_id := u32(1)
db_id := u32(42)
// Set the database ID
vfs.set_database_id(vfs_id, db_id)!
// Get the database ID and verify it matches
retrieved_id := vfs.get_database_id(vfs_id)!
assert retrieved_id == db_id
}
fn test_get_nonexistent_id() ! {
mut vfs := setup_vfs()!
// Try to get a database ID that doesn't exist
if _ := vfs.get_database_id(999) {
assert false, 'Expected error when getting non-existent ID'
} else {
assert err.msg() == 'VFS ID 999 not found.'
}
}
fn test_multiple_ids() ! {
mut vfs := setup_vfs()!
// Set multiple IDs
vfs.set_database_id(1, 101)!
vfs.set_database_id(2, 102)!
vfs.set_database_id(3, 103)!
// Verify all IDs can be retrieved correctly
assert vfs.get_database_id(1)! == 101
assert vfs.get_database_id(2)! == 102
assert vfs.get_database_id(3)! == 103
}
fn test_update_id() ! {
mut vfs := setup_vfs()!
// Set an ID
vfs.set_database_id(1, 100)!
assert vfs.get_database_id(1)! == 100
// Update the ID
vfs.set_database_id(1, 200)!
assert vfs.get_database_id(1)! == 200
}

View File

@@ -1,29 +0,0 @@
module vfs_db
import time
import freeflowuniverse.herolib.vfs
// Metadata represents the common metadata for both files and directories
pub struct NewMetadata {
pub mut:
name string @[required] // name of file or directory
path string @[required] // name of file or directory
file_type vfs.FileType @[required]
size u64 @[required]
mode u32 = 0o644 // file permissions
owner string = 'user'
group string = 'user'
}
pub fn (mut fs DatabaseVFS) new_metadata(metadata NewMetadata) vfs.Metadata {
return vfs.new_metadata(
id: fs.get_next_id()
name: metadata.name
path: metadata.path
file_type: metadata.file_type
size: metadata.size
mode: metadata.mode
owner: metadata.owner
group: metadata.group
)
}

View File

@@ -1,142 +0,0 @@
module vfs_db
import os
import freeflowuniverse.herolib.data.ourdb
import freeflowuniverse.herolib.vfs as vfs_mod
import rand
fn setup_vfs() !&DatabaseVFS {
test_data_dir := os.join_path(os.temp_dir(), 'vfsourdb_metadata_test_${rand.string(3)}')
os.mkdir_all(test_data_dir)!
// Create separate databases for data and metadata
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
// Create VFS with separate databases for data and metadata
mut fs := new(mut db_data, mut db_metadata)!
return fs
}
fn test_new_metadata_file() ! {
mut fs := setup_vfs()!
// Test creating file metadata
metadata := fs.new_metadata(
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 1024
)
// Verify the metadata
assert metadata.name == 'test_file.txt'
assert metadata.file_type == .file
assert metadata.size == 1024
assert metadata.mode == 0o644 // Default mode
assert metadata.owner == 'user' // Default owner
assert metadata.group == 'user' // Default group
assert metadata.id == 1 // First ID
}
fn test_new_metadata_directory() ! {
mut fs := setup_vfs()!
// Test creating directory metadata
metadata := fs.new_metadata(
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
)
// Verify the metadata
assert metadata.name == 'test_dir'
assert metadata.file_type == .directory
assert metadata.size == 0
assert metadata.mode == 0o644 // Default mode
assert metadata.owner == 'user' // Default owner
assert metadata.group == 'user' // Default group
assert metadata.id == 1 // First ID
}
fn test_new_metadata_symlink() ! {
mut fs := setup_vfs()!
// Test creating symlink metadata
metadata := fs.new_metadata(
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
)
// Verify the metadata
assert metadata.name == 'test_link'
assert metadata.file_type == .symlink
assert metadata.size == 0
assert metadata.mode == 0o644 // Default mode
assert metadata.owner == 'user' // Default owner
assert metadata.group == 'user' // Default group
assert metadata.id == 1 // First ID
}
fn test_new_metadata_custom_permissions() ! {
mut fs := setup_vfs()!
// Test creating metadata with custom permissions
metadata := fs.new_metadata(
name: 'custom_file.txt'
path: '/custom_file.txt'
file_type: .file
size: 2048
mode: 0o755
owner: 'admin'
group: 'staff'
)
// Verify the metadata
assert metadata.name == 'custom_file.txt'
assert metadata.file_type == .file
assert metadata.size == 2048
assert metadata.mode == 0o755
assert metadata.owner == 'admin'
assert metadata.group == 'staff'
assert metadata.id == 1 // First ID
}
fn test_new_metadata_sequential_ids() ! {
mut fs := setup_vfs()!
// Create multiple metadata objects and verify IDs are sequential
metadata1 := fs.new_metadata(
name: 'file1.txt'
path: '/file1.txt'
file_type: .file
size: 100
)
assert metadata1.id == 1
metadata2 := fs.new_metadata(
name: 'file2.txt'
path: '/file2.txt'
file_type: .file
size: 200
)
assert metadata2.id == 2
metadata3 := fs.new_metadata(
name: 'file3.txt'
path: '/file3.txt'
file_type: .file
size: 300
)
assert metadata3.id == 3
}

View File

@@ -14,10 +14,6 @@ fn (d &Directory) get_metadata() vfs.Metadata {
return d.metadata
}
fn (d &Directory) get_path() string {
return d.metadata.path
}
// is_dir returns true if the entry is a directory
pub fn (d &Directory) is_dir() bool {
return d.metadata.file_type == .directory

View File

@@ -7,7 +7,6 @@ fn test_directory_get_metadata() {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -35,39 +34,11 @@ fn test_directory_get_metadata() {
assert retrieved_metadata.group == 'user'
}
fn test_directory_get_path() {
// Create a directory with metadata
metadata := vfs_mod.Metadata{
id: 1
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
mode: 0o755
owner: 'user'
group: 'user'
created_at: 0
modified_at: 0
accessed_at: 0
}
dir := Directory{
metadata: metadata
children: []
parent_id: 0
}
// Test get_path
path := dir.get_path()
assert path == '/test_dir'
}
fn test_directory_is_dir() {
// Create a directory with metadata
metadata := vfs_mod.Metadata{
id: 1
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -95,7 +66,6 @@ fn test_directory_with_children() {
metadata := vfs_mod.Metadata{
id: 1
name: 'parent_dir'
path: '/parent_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -124,7 +94,6 @@ fn test_directory_with_parent() {
metadata := vfs_mod.Metadata{
id: 2
name: 'child_dir'
path: '/parent_dir/child_dir'
file_type: .directory
size: 0
mode: 0o755

View File

@@ -19,10 +19,6 @@ fn (f &File) get_metadata() vfs.Metadata {
return f.metadata
}
fn (f &File) get_path() string {
return f.metadata.path
}
// is_dir returns true if the entry is a directory
pub fn (f &File) is_dir() bool {
return f.metadata.file_type == .directory

View File

@@ -30,7 +30,6 @@ fn test_file_get_metadata() {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -58,39 +57,11 @@ fn test_file_get_metadata() {
assert retrieved_metadata.group == 'user'
}
fn test_file_get_path() {
// Create a file with metadata
metadata := vfs_mod.Metadata{
id: 1
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
owner: 'user'
group: 'user'
created_at: 0
modified_at: 0
accessed_at: 0
}
file := File{
metadata: metadata
parent_id: 0
chunk_ids: []
}
// Test get_path
path := file.get_path()
assert path == '/test_file.txt'
}
fn test_file_is_file() {
// Create a file with metadata
metadata := vfs_mod.Metadata{
id: 1
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -118,7 +89,6 @@ fn test_file_write_read() {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -153,7 +123,6 @@ fn test_file_rename() {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -180,7 +149,6 @@ fn test_new_file() ! {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -202,7 +170,6 @@ fn test_new_file() ! {
assert file.metadata.name == 'test_file.txt'
assert file.metadata.file_type == .file
assert file.metadata.size == 13
assert file.get_path() == '/test_file.txt'
}
fn test_copy_file() ! {
@@ -210,7 +177,6 @@ fn test_copy_file() ! {
original_metadata := vfs_mod.Metadata{
id: 1
name: 'original.txt'
path: '/original.txt'
file_type: .file
size: 13
mode: 0o755
@@ -231,7 +197,6 @@ fn test_copy_file() ! {
copied_metadata := vfs_mod.Metadata{
id: 2 // Different ID
name: 'copied.txt'
path: '/copied.txt'
file_type: .file
size: 13
mode: 0o755

View File

@@ -9,10 +9,6 @@ fn (e &FSEntry) get_metadata() vfs.Metadata {
return e.metadata
}
fn (e &FSEntry) get_path() string {
return e.metadata.path
}
fn (e &FSEntry) is_dir() bool {
return e.metadata.file_type == .directory
}

View File

@@ -8,7 +8,6 @@ fn test_fsentry_directory() {
metadata: vfs_mod.Metadata{
id: 1
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -29,7 +28,6 @@ fn test_fsentry_directory() {
assert entry.get_metadata().id == 1
assert entry.get_metadata().name == 'test_dir'
assert entry.get_metadata().file_type == .directory
assert entry.get_path() == '/test_dir'
assert entry.is_dir() == true
assert entry.is_file() == false
assert entry.is_symlink() == false
@@ -41,7 +39,6 @@ fn test_fsentry_file() {
metadata: vfs_mod.Metadata{
id: 2
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -62,7 +59,6 @@ fn test_fsentry_file() {
assert entry.get_metadata().id == 2
assert entry.get_metadata().name == 'test_file.txt'
assert entry.get_metadata().file_type == .file
assert entry.get_path() == '/test_file.txt'
assert entry.is_dir() == false
assert entry.is_file() == true
assert entry.is_symlink() == false
@@ -74,7 +70,6 @@ fn test_fsentry_symlink() {
metadata: vfs_mod.Metadata{
id: 3
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -95,7 +90,6 @@ fn test_fsentry_symlink() {
assert entry.get_metadata().id == 3
assert entry.get_metadata().name == 'test_link'
assert entry.get_metadata().file_type == .symlink
assert entry.get_path() == '/test_link'
assert entry.is_dir() == false
assert entry.is_file() == false
assert entry.is_symlink() == true
@@ -107,7 +101,6 @@ fn test_fsentry_match() {
metadata: vfs_mod.Metadata{
id: 1
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -125,7 +118,6 @@ fn test_fsentry_match() {
metadata: vfs_mod.Metadata{
id: 2
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -143,7 +135,6 @@ fn test_fsentry_match() {
metadata: vfs_mod.Metadata{
id: 3
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777

View File

@@ -26,10 +26,6 @@ fn (s &Symlink) get_metadata() vfs.Metadata {
return s.metadata
}
fn (s &Symlink) get_path() string {
return s.metadata.path
}
// is_dir returns true if the entry is a directory
pub fn (self &Symlink) is_dir() bool {
return self.metadata.file_type == .directory

View File

@@ -7,7 +7,6 @@ fn test_symlink_get_metadata() {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -35,39 +34,11 @@ fn test_symlink_get_metadata() {
assert retrieved_metadata.group == 'user'
}
fn test_symlink_get_path() {
// Create a symlink with metadata
metadata := vfs_mod.Metadata{
id: 1
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
owner: 'user'
group: 'user'
created_at: 0
modified_at: 0
accessed_at: 0
}
symlink := Symlink{
metadata: metadata
target: '/path/to/target'
parent_id: 0
}
// Test get_path
path := symlink.get_path()
assert path == '/test_link'
}
fn test_symlink_is_symlink() {
// Create a symlink with metadata
metadata := vfs_mod.Metadata{
id: 1
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -95,7 +66,6 @@ fn test_symlink_update_target() ! {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -122,7 +92,6 @@ fn test_symlink_get_target() ! {
metadata := vfs_mod.Metadata{
id: 1
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -149,7 +118,6 @@ fn test_symlink_with_parent() {
metadata := vfs_mod.Metadata{
id: 2
name: 'test_link'
path: '/parent_dir/test_link'
file_type: .symlink
size: 0
mode: 0o777

View File

@@ -16,15 +16,8 @@ pub fn (mut fs DatabaseVFS) directory_mkdir(mut dir Directory, name_ string) !&D
}
}
path := if dir.metadata.path == '/' {
'/${name}'
} else {
"/${dir.metadata.path.trim('/')}/${name}"
}
new_dir := fs.new_directory(
name: name,
path: path
parent_id: dir.metadata.id
)!
dir.children << new_dir.metadata.id
@@ -35,7 +28,6 @@ pub fn (mut fs DatabaseVFS) directory_mkdir(mut dir Directory, name_ string) !&D
pub struct NewDirectory {
pub:
name string @[required] // name of file or directory
path string @[required] // name of file or directory
mode u32 = 0o755 // file permissions
owner string = 'user'
group string = 'user'
@@ -47,15 +39,15 @@ pub:
pub fn (mut fs DatabaseVFS) new_directory(dir NewDirectory) !&Directory {
d := Directory{
parent_id: dir.parent_id
metadata: fs.new_metadata(NewMetadata{
metadata: vfs.new_metadata(
id: fs.get_next_id()
name: dir.name
path: dir.path
mode: dir.mode
owner: dir.owner
group: dir.group
size: u64(0)
file_type: .directory
})
)
children: dir.children
}
// Save new directory to DB
@@ -100,12 +92,6 @@ pub fn (mut fs DatabaseVFS) directory_touch(mut dir Directory, name_ string) !&F
}
}
}
path := if dir.metadata.path == '/' {
'/${name}'
} else {
"/${dir.metadata.path.trim('/')}/${name}"
}
// Create new file with correct parent_id
mut file_id := fs.save_file(File{
@@ -113,7 +99,6 @@ pub fn (mut fs DatabaseVFS) directory_touch(mut dir Directory, name_ string) !&F
metadata: vfs.Metadata {
id: fs.get_next_id()
name: name
path: path
file_type: .file
created_at: time.now().unix()
modified_at: time.now().unix()
@@ -148,7 +133,9 @@ pub fn (mut fs DatabaseVFS) directory_rm(mut dir Directory, name string) ! {
}
// get entry from db_metadata
metadata_bytes := fs.db_metadata.get(fs.get_database_id(entry.metadata.id)!) or { return error('Failed to delete entry: ${err}') }
metadata_bytes := fs.db_metadata.get(
fs.id_table[entry.metadata.id] or { return error('Failed to delete entry') }
) or { return error('Failed to delete entry: ${err}') }
// Handle file data deletion if it's a file
if entry is File {
@@ -163,7 +150,9 @@ pub fn (mut fs DatabaseVFS) directory_rm(mut dir Directory, name string) ! {
log.debug('[DatabaseVFS] Deleting file metadata ${file.metadata.id}')
}
fs.db_metadata.delete(fs.get_database_id(entry.metadata.id)!) or { return error('Failed to delete entry: ${err}') }
fs.db_metadata.delete(
fs.id_table[entry.metadata.id] or { return error('Failed to delete entry') }
) or { return error('Failed to delete entry: ${err}') }
// Update children list - make sure we don't remove the wrong child
dir.children = dir.children.filter(it != entry.metadata.id).clone()
@@ -202,16 +191,10 @@ pub fn (mut fs DatabaseVFS) directory_move(dir_ Directory, args_ MoveDirArgs) !&
found = true
child_id_to_remove = child_id
new_path := if args.dst_parent_dir.metadata.path == '/' {
'/${args.dst_entry_name}'
} else {
"/${args.dst_parent_dir.metadata.path.trim('/')}/${args.dst_entry_name}"
}
// Handle both files and directories
if entry is File {
mut file_entry := entry as File
file_entry.metadata.name = args.dst_entry_name
file_entry.metadata.path = new_path
file_entry.metadata.modified_at = time.now().unix()
file_entry.parent_id = args.dst_parent_dir.metadata.id
@@ -233,7 +216,6 @@ pub fn (mut fs DatabaseVFS) directory_move(dir_ Directory, args_ MoveDirArgs) !&
// Handle directory
mut dir_entry := entry as Directory
dir_entry.metadata.name = args.dst_entry_name
dir_entry.metadata.path = new_path
dir_entry.metadata.modified_at = time.now().unix()
dir_entry.parent_id = args.dst_parent_dir.metadata.id
@@ -270,7 +252,6 @@ fn (mut fs DatabaseVFS) move_children_recursive(mut dir Directory) ! {
for child in dir.children {
if mut child_entry := fs.load_entry(child) {
child_entry.parent_id = dir.metadata.id
child_entry.metadata.path = '${dir.metadata.path}/${child_entry.metadata.name}'
if child_entry is Directory {
// Recursively move subdirectories
@@ -304,15 +285,31 @@ pub fn (mut fs DatabaseVFS) directory_copy(mut dir Directory, args_ CopyDirArgs)
for child_id in dir.children {
if mut entry := fs.load_entry(child_id) {
if entry.metadata.name == args.src_entry_name {
if entry is File {
return error('${args.src_entry_name} is a file, not a directory')
}
if entry is Symlink {
return error('${args.src_entry_name} is a symlink, not a directory')
}
found = true
if entry is File {
mut file_entry := entry as File
mut new_file := File{
...file_entry,
metadata: Metadata{...file_entry.metadata,
id: fs.get_next_id()
name: args.dst_entry_name
}
parent_id: args.dst_parent_dir.metadata.id
}
fs.save_entry(new_file)!
args.dst_parent_dir.children << new_file.metadata.id
fs.save_entry(args.dst_parent_dir)!
return args.dst_parent_dir
} else if entry is Symlink {
mut symlink_entry := entry as Symlink
mut new_symlink := Symlink{...symlink_entry,
parent_id: args.dst_parent_dir.metadata.id
}
args.dst_parent_dir.children << new_symlink.metadata.id
fs.save_entry(args.dst_parent_dir)!
return args.dst_parent_dir
}
mut src_dir := entry as Directory
// Make sure we have the latest version of the source directory
@@ -379,7 +376,6 @@ fn (mut fs DatabaseVFS) copy_children_recursive(mut src_dir Directory, mut dst_d
metadata: Metadata{
...entry_.metadata
id: fs.get_next_id()
path: '${dst_dir.metadata.path}/${entry_.metadata.name}'
}
children: []u32{}
parent_id: dst_dir.metadata.id
@@ -395,7 +391,6 @@ fn (mut fs DatabaseVFS) copy_children_recursive(mut src_dir Directory, mut dst_d
metadata: vfs.Metadata{
...entry_.metadata
id: fs.get_next_id()
path: '${dst_dir.metadata.path}/${entry_.metadata.name}'
}
chunk_ids: entry_.chunk_ids
parent_id: dst_dir.metadata.id
@@ -409,7 +404,6 @@ fn (mut fs DatabaseVFS) copy_children_recursive(mut src_dir Directory, mut dst_d
metadata: Metadata{
...entry_.metadata
id: fs.get_next_id()
path: '${dst_dir.metadata.path}/${entry_.metadata.name}'
}
target: entry_.target
parent_id: dst_dir.metadata.id
@@ -436,21 +430,18 @@ pub fn (mut fs DatabaseVFS) directory_rename(dir Directory, src_name string, dst
if mut entry is Directory {
// Handle directory rename
entry.metadata.name = dst_name
entry.metadata.path = "${entry.metadata.path.all_before_last('/')}/${dst_name}"
entry.metadata.modified_at = time.now().unix()
fs.save_entry(entry)!
return entry
} else if mut entry is File {
// Handle file rename
entry.metadata.name = dst_name
entry.metadata.path = "${entry.metadata.path.all_before_last('/')}/${dst_name}"
entry.metadata.modified_at = time.now().unix()
fs.save_entry(entry)!
return entry
} else if mut entry is Symlink {
// Handle symlink rename
entry.metadata.name = dst_name
entry.metadata.path = "${entry.metadata.path.all_before_last('/')}/${dst_name}"
entry.metadata.modified_at = time.now().unix()
fs.save_entry(entry)!
return entry

View File

@@ -12,12 +12,10 @@ fn setup_fs() !(&DatabaseVFS, string) {
// Create separate databases for data and metadata
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
// Create VFS with separate databases for data and metadata
@@ -38,7 +36,6 @@ fn test_new_directory() ! {
// Test creating a new directory
mut dir := fs.new_directory(
name: 'test_dir'
path: '/test_dir'
)!
// Verify the directory
@@ -60,7 +57,6 @@ fn test_new_directory_with_custom_permissions() ! {
// Test creating a directory with custom permissions
mut dir := fs.new_directory(
name: 'custom_dir'
path: '/custom_dir'
mode: 0o700
owner: 'admin'
group: 'staff'
@@ -86,7 +82,6 @@ fn test_copy_directory() ! {
metadata: vfs_mod.Metadata{
id: 1
name: 'original_dir'
path: '/original_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -123,7 +118,6 @@ fn test_directory_mkdir() ! {
// Create a parent directory
mut parent_dir := fs.new_directory(
name: 'parent_dir'
path: '/parent_dir'
)!
// Test creating a subdirectory
@@ -155,7 +149,6 @@ fn test_directory_touch() ! {
// Create a parent directory
mut parent_dir := fs.new_directory(
name: 'parent_dir'
path: '/parent_dir'
)!
// Test creating a file
@@ -196,7 +189,6 @@ fn test_directory_rm() ! {
// Create a parent directory
mut parent_dir := fs.new_directory(
name: 'parent_dir'
path: '/parent_dir'
)!
// Create a file to remove
@@ -244,7 +236,6 @@ fn test_directory_rename() ! {
// Create a parent directory
mut parent_dir := fs.new_directory(
name: 'parent_dir'
path: '/parent_dir'
)!
// Create a subdirectory to rename
@@ -273,7 +264,6 @@ fn test_directory_children() ! {
// Create a parent directory
mut parent_dir := fs.new_directory(
name: 'parent_dir'
path: '/parent_dir'
)!
// Initially, the directory should be empty
@@ -317,8 +307,8 @@ fn test_directory_move() ! {
}
// Create source and destination parent directories
mut src_parent := fs.new_directory(name: 'src_parent', path: '/src_parent')!
mut dst_parent := fs.new_directory(name: 'dst_parent', path: '/dst_parent')!
mut src_parent := fs.new_directory(name: 'src_parent')!
mut dst_parent := fs.new_directory(name: 'dst_parent')!
// Create a directory to move with nested structure
mut dir_to_move := fs.directory_mkdir(mut src_parent, 'dir_to_move')!
@@ -400,8 +390,8 @@ fn test_directory_copy() ! {
}
// Create source and destination parent directories
mut src_parent := fs.new_directory(name: 'src_parent', path: '/src_parent')!
mut dst_parent := fs.new_directory(name: 'dst_parent', path: '/dst_parent')!
mut src_parent := fs.new_directory(name: 'src_parent')!
mut dst_parent := fs.new_directory(name: 'dst_parent')!
// Create a directory to copy with nested structure
mut dir_to_copy := fs.directory_mkdir(mut src_parent, 'dir_to_copy')!
@@ -493,7 +483,6 @@ fn test_directory_add_symlink() ! {
// Create a parent directory
mut parent_dir := fs.new_directory(
name: 'parent_dir'
path: '/parent_dir'
)!
// Create a symlink
@@ -501,7 +490,6 @@ fn test_directory_add_symlink() ! {
metadata: vfs_mod.Metadata{
id: fs.get_next_id()
name: 'test_link'
path: '/parent_dir/test_link'
file_type: .symlink
size: 0
mode: 0o777

View File

@@ -1,90 +0,0 @@
module vfs_db
import freeflowuniverse.herolib.vfs
import os
import time
// Implementation of VFSImplementation interface
pub fn (mut fs DatabaseVFS) root_get_as_dir() !&Directory {
// Try to load root directory from DB if it exists
if fs.root_id in fs.id_table {
if data := fs.db_metadata.get(fs.get_database_id(fs.root_id)!) {
mut loaded_root := decode_directory(data) or {
return error('Failed to decode root directory: ${err}')
}
return &loaded_root
}
}
// Create and save new root directory
mut myroot := Directory{
metadata: vfs.Metadata{
id: fs.get_next_id()
file_type: .directory
name: ''
path: '/'
created_at: time.now().unix()
modified_at: time.now().unix()
accessed_at: time.now().unix()
mode: 0o755 // default directory permissions
owner: 'user' // TODO: get from system
group: 'user' // TODO: get from system
}
parent_id: 0
}
fs.root_id = fs.save_entry(myroot)!
return &myroot
}
fn (mut self DatabaseVFS) get_entry(path_ string) !FSEntry {
path := '${path_.trim_left('/').trim_right('/')}'
if path == '/' || path == '' || path == '.' {
return FSEntry(self.root_get_as_dir()!)
}
parts := path.split('/')
mut parent_dir := *self.root_get_as_dir()!
for i, part in parts {
entry := self.directory_get_entry(parent_dir, part) or {
return error('Failed to get entry ${err}')
}
if i == parts.len - 1 {
// last part, means entry is found
return entry
}
if entry is Directory {
parent_dir = entry
} else {
return error('Failed to get entry, expected dir')
}
}
// mut current := *self.root_get_as_dir()!
// return self.directory_get_entry(mut current, path) or {
return error('Path not found: ${path}')
// }
}
// internal function to get an entry of some name from a directory
fn (mut self DatabaseVFS) directory_get_entry(dir Directory, name string) ?FSEntry {
// mut children := self.directory_children(mut dir, false) or {
// panic('this should never happen')
// }
for child_id in dir.children {
if entry := self.load_entry(child_id) {
if entry.metadata.name == name {
return entry
}
} else {
panic('Filesystem is corrupted, this should never happen ${err}')
}
}
return none
}
fn (mut self DatabaseVFS) get_directory(path string) !&Directory {
mut entry := self.get_entry(path)!
if mut entry is Directory {
return &entry
}
return error('Not a directory: ${path}')
}

View File

@@ -16,30 +16,27 @@ pub fn (mut self DatabaseVFS) file_create(path_ string) !vfs.FSEntry {
// Get parent directory
parent_path := os.dir(path)
file_name := os.base(path)
mut parent_dir := self.get_directory(parent_path)!
log.info('[DatabaseVFS] Creating file ${file_name} in ${parent_path}')
log.info('[DatabaseVFS] Creating file ${file_name} in ${parent_path} for ${path_}')
mut parent_dir := self.get_directory(parent_path) or {
return error('Failed to get parent directory ${parent_path}: ${err}')
}
entry := self.directory_touch(mut parent_dir, file_name)!
log.info('[DatabaseVFS] Created file ${file_name} in ${parent_path}')
return entry
}
pub fn (mut self DatabaseVFS) file_read(path_ string) ![]u8 {
path := '/${path_.trim_left('/').trim_right('/')}'
path := texttools.path_fix(path_)
log.info('[DatabaseVFS] Reading file ${path}')
mut file := self.get_entry(path)!
log.info('[DatabaseVFS] Got file ${path}')
if mut file is File {
metadata := self.db_metadata.get(self.get_database_id(file.metadata.id)!) or {
return error('Failed to get file metadata ${err}')
}
mut decoded_file := decode_file_metadata(metadata) or { return error('Failed to decode file: ${err}') }
println('debugzo-1 ${decoded_file.chunk_ids}')
mut file_data := []u8{}
// log.debug('[DatabaseVFS] Got database chunk ids ${chunk_ids}')
for id in decoded_file.chunk_ids {
log.debug('[DatabaseVFS] Getting chunk ${id}')
// there were chunk ids stored with file so file has data
if chunk_bytes := self.db_data.get(id) {
mut file_data := []u8{}
// log.debug('[DatabaseVFS] Got database chunk ids ${chunk_ids}')
for id in file.chunk_ids {
log.debug('[DatabaseVFS] Getting chunk ${id}')
// there were chunk ids stored with file so file has data
if chunk_bytes := self.db_data.get(id) {
file_data << chunk_bytes
} else {
return error('Failed to fetch file data: ${err}')
@@ -51,17 +48,21 @@ pub fn (mut self DatabaseVFS) file_read(path_ string) ![]u8 {
}
pub fn (mut self DatabaseVFS) file_write(path_ string, data []u8) ! {
path := os.abs_path(path_)
path := texttools.path_fix(path_)
if mut entry := self.get_entry(path) {
if mut entry is File {
log.info('[DatabaseVFS] Writing ${data.len} bytes to ${path}')
self.save_file(entry, data)!
self.save_file(entry, data) or {
return error('Failed to save file: ${err}')
}
} else {
panic('handle error')
}
} else {
self.file_create(path)!
self.file_create(path) or {
return error('Failed to create file: ${err}')
}
self.file_write(path, data)!
}
}
@@ -123,7 +124,6 @@ pub fn (mut self DatabaseVFS) link_create(target_path string, link_path string)
metadata: vfs.Metadata{
id: self.get_next_id()
name: link_name
path: link_path
file_type: .symlink
created_at: time.now().unix()
modified_at: time.now().unix()
@@ -168,12 +168,13 @@ pub fn (mut self DatabaseVFS) link_delete(path string) ! {
return true
}
// self.print() or {panic(err)}
log.info('[DatabaseVFS] Checking path exists ${path}')
log.debug('[DatabaseVFS] Checking path exists ${path}')
self.get_entry(path) or { return false }
return true
}
pub fn (mut fs DatabaseVFS) get(path string) !vfs.FSEntry {
pub fn (mut fs DatabaseVFS) get(path_ string) !vfs.FSEntry {
path := texttools.path_fix(path_)
log.info('[DatabaseVFS] Getting filesystem entry ${path}')
return fs.get_entry(path)!
}
@@ -188,7 +189,9 @@ pub fn (mut self DatabaseVFS) rename(old_path string, new_path string) !vfs.FSEn
return self.directory_rename(src_parent_dir, src_name, dst_name)!
}
pub fn (mut self DatabaseVFS) copy(src_path string, dst_path string) !vfs.FSEntry {
pub fn (mut self DatabaseVFS) copy(src_path_ string, dst_path_ string) !vfs.FSEntry {
src_path := texttools.path_fix_absolute(src_path_)
dst_path := texttools.path_fix_absolute(dst_path_)
log.info('[DatabaseVFS] Copying ${src_path} to ${dst_path}')
src_parent_path := os.dir(src_path)
dst_parent_path := os.dir(dst_path)
@@ -220,13 +223,13 @@ pub fn (mut self DatabaseVFS) copy(src_path string, dst_path string) !vfs.FSEntr
// copy_file creates a copy of a file
pub fn (mut self DatabaseVFS) copy_file(file File) !&File {
log.info('[DatabaseVFS] Copying file ${file.metadata.path}')
log.info('[DatabaseVFS] Copying file ${file.metadata.name}')
// Save the file with its metadata and data
file_id := self.save_file(file, [])!
self.save_file(file, [])!
// Load the file from the database
mut entry := self.load_entry(file_id)!
mut entry := self.load_entry(file.metadata.id)!
if mut entry is File {
return &entry
}
@@ -234,10 +237,9 @@ pub fn (mut self DatabaseVFS) copy_file(file File) !&File {
}
pub fn (mut self DatabaseVFS) move(src_path string, dst_path string) !vfs.FSEntry {
log.info('[DatabaseVFS] Moving ${src_path} to ${dst_path}')
src_parent_path := os.dir(src_path)
dst_parent_path := os.dir(dst_path)
log.info('[DatabaseVFS] Moving ${texttools.path_fix(src_path)} to ${texttools.path_fix(dst_path)}')
src_parent_path := os.dir(texttools.path_fix_absolute(src_path))
dst_parent_path := os.dir(texttools.path_fix_absolute(dst_path))
if !self.exists(src_parent_path) {
return error('${src_parent_path} does not exist')
@@ -275,7 +277,7 @@ pub fn (mut self DatabaseVFS) delete(path_ string) ! {
mut parent_dir := self.get_directory(parent_path)!
self.directory_rm(mut parent_dir, file_name) or {
log.error('[DatabaseVFS] Failed to remove ${file_name} from ${parent_dir.metadata.path}\n${err}')
log.error('[DatabaseVFS] Failed to remove ${file_name} from ${parent_dir.metadata.name}\n${err}')
return err
}
}

View File

@@ -11,12 +11,10 @@ fn setup_vfs() !(&DatabaseVFS, string) {
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
mut vfs := new(mut db_data, mut db_metadata)!

View File

@@ -12,12 +12,10 @@ fn setup_fs() !(&DatabaseVFS, string) {
// Create separate databases for data and metadata
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
// Create VFS with separate databases for data and metadata
@@ -38,7 +36,6 @@ fn test_directory_print_empty() ! {
// Create an empty directory
mut dir := fs.new_directory(
name: 'test_dir'
path: '/test_dir'
)!
// Test printing the empty directory
@@ -57,7 +54,6 @@ fn test_directory_print_with_contents() ! {
// Create a directory with various contents
mut dir := fs.new_directory(
name: 'test_dir'
path: '/test_dir'
)!
// Add a subdirectory
@@ -71,7 +67,6 @@ fn test_directory_print_with_contents() ! {
metadata: vfs_mod.Metadata{
id: fs.get_next_id()
name: 'test_link'
path: '/test_dir/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -105,7 +100,6 @@ fn test_directory_printall_simple() ! {
// Create a simple directory structure
mut dir := fs.new_directory(
name: 'root_dir'
path: '/root_dir'
)!
// Add a file
@@ -128,7 +122,6 @@ fn test_directory_printall_nested() ! {
// Create a nested directory structure
mut root := fs.new_directory(
name: 'root'
path: '/root'
)!
// Add a subdirectory
@@ -151,7 +144,6 @@ fn test_directory_printall_nested() ! {
metadata: vfs_mod.Metadata{
id: fs.get_next_id()
name: 'test_link'
path: '/root/subdir1/subdir2/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -188,7 +180,6 @@ fn test_directory_printall_empty() ! {
// Create an empty directory
mut dir := fs.new_directory(
name: 'empty_dir'
path: '/empty_dir'
)!
// Test printing the empty directory recursively

View File

@@ -12,12 +12,10 @@ fn setup_vfs() !(&DatabaseVFS, string) {
// Create separate databases for data and metadata
mut db_data := ourdb.new(
path: os.join_path(test_data_dir, 'data')
incremental_mode: false
)!
mut db_metadata := ourdb.new(
path: os.join_path(test_data_dir, 'metadata')
incremental_mode: false
)!
// Create VFS with separate databases for data and metadata
@@ -62,7 +60,6 @@ fn test_save_load_entry() ! {
metadata: vfs_mod.Metadata{
id: 1
name: 'test_dir'
path: '/test_dir'
file_type: .directory
size: 0
mode: 0o755
@@ -77,11 +74,10 @@ fn test_save_load_entry() ! {
}
// Save the directory
saved_id := vfs.save_entry(dir)!
assert saved_id == 1
vfs.save_entry(dir)!
// Load the directory
loaded_entry := vfs.load_entry(1)!
loaded_entry := vfs.load_entry(dir.metadata.id)!
// Verify it's the same directory
loaded_dir := loaded_entry as Directory
@@ -101,7 +97,6 @@ fn test_save_load_file_with_data() ! {
metadata: vfs_mod.Metadata{
id: 2
name: 'test_file.txt'
path: '/test_file.txt'
file_type: .file
size: 13
mode: 0o644
@@ -116,11 +111,10 @@ fn test_save_load_file_with_data() ! {
}
// Save the file
saved_id := vfs.save_entry(file)!
assert saved_id == 2
vfs.save_entry(file)!
// Load the file
loaded_entry := vfs.load_entry(2)!
loaded_entry := vfs.load_entry(file.metadata.id)!
// Verify it's the same file with the same data
loaded_file := loaded_entry as File
@@ -141,7 +135,6 @@ fn test_save_load_file_without_data() ! {
metadata: vfs_mod.Metadata{
id: 3
name: 'empty_file.txt'
path: '/empty_file.txt'
file_type: .file
size: 0
mode: 0o644
@@ -156,11 +149,10 @@ fn test_save_load_file_without_data() ! {
}
// Save the file
saved_id := vfs.save_entry(file)!
assert saved_id == 3
vfs.save_entry(file)!
// Load the file
loaded_entry := vfs.load_entry(3)!
loaded_entry := vfs.load_entry(file.metadata.id)!
// Verify it's the same file with empty data
loaded_file := loaded_entry as File
@@ -181,7 +173,6 @@ fn test_save_load_symlink() ! {
metadata: vfs_mod.Metadata{
id: 4
name: 'test_link'
path: '/test_link'
file_type: .symlink
size: 0
mode: 0o777
@@ -196,11 +187,10 @@ fn test_save_load_symlink() ! {
}
// Save the symlink
saved_id := vfs.save_entry(symlink)!
assert saved_id == 4
vfs.save_entry(symlink)!
// Load the symlink
loaded_entry := vfs.load_entry(4)!
loaded_entry := vfs.load_entry(symlink.metadata.id)!
// Verify it's the same symlink
loaded_symlink := loaded_entry as Symlink
@@ -220,6 +210,6 @@ fn test_load_nonexistent_entry() ! {
if _ := vfs.load_entry(999) {
assert false, 'Expected error when loading non-existent entry'
} else {
assert err.msg() == 'VFS ID 999 not found.'
assert true
}
}