Remove path from fsentry metadata, make vfs and webdav work again with fixes
This commit is contained in:
@@ -1,27 +1,20 @@
|
||||
#!/usr/bin/env -S v -n -w -gc none -cc tcc -d use_openssl -enable-globals run
|
||||
|
||||
// import freeflowuniverse.herolib.vfs.webdav
|
||||
import freeflowuniverse.herolib.vfs.vfs_nested
|
||||
import freeflowuniverse.herolib.vfs.vfs_core
|
||||
import freeflowuniverse.herolib.vfs.vfs_ourdb
|
||||
import freeflowuniverse.herolib.dav.webdav
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
import freeflowuniverse.herolib.data.ourdb
|
||||
import os
|
||||
import log
|
||||
|
||||
mut high_level_vfs := vfsnested.new()
|
||||
const database_path := os.join_path(os.dir(@FILE), 'database')
|
||||
|
||||
// lower level VFS Implementations that use OurDB
|
||||
mut vfs1 := vfsourdb.new('/tmp/test_webdav_ourdbvfs/vfs1', '/tmp/test_webdav_ourdbvfs/vfs1')!
|
||||
mut vfs2 := vfsourdb.new('/tmp/test_webdav_ourdbvfs/vfs2', '/tmp/test_webdav_ourdbvfs/vfs2')!
|
||||
mut vfs3 := vfsourdb.new('/tmp/test_webdav_ourdbvfs/vfs3', '/tmp/test_webdav_ourdbvfs/vfs3')!
|
||||
mut metadata_db := ourdb.new(path:os.join_path(database_path, 'metadata'))!
|
||||
mut data_db := ourdb.new(path:os.join_path(database_path, 'data'))!
|
||||
mut vfs := vfs_db.new(mut metadata_db, mut data_db)!
|
||||
mut server := webdav.new_server(vfs: vfs, user_db: {
|
||||
'admin': '123'
|
||||
})!
|
||||
|
||||
// Nest OurDB VFS instances at different paths
|
||||
high_level_vfs.add_vfs('/data', vfs1) or { panic(err) }
|
||||
high_level_vfs.add_vfs('/config', vfs2) or { panic(err) }
|
||||
high_level_vfs.add_vfs('/data/backup', vfs3) or { panic(err) } // Nested under /data
|
||||
log.set_level(.debug)
|
||||
|
||||
// // Create WebDAV Server that uses high level VFS
|
||||
// mut webdav_server := webdav.new_app(
|
||||
// vfs: high_level_vfs
|
||||
// user_db: {
|
||||
// 'omda': '123'
|
||||
// }
|
||||
// )!
|
||||
// webdav_server.run()
|
||||
server.run()
|
||||
@@ -116,11 +116,20 @@ pub fn name_fix_dot_notation_to_snake_case(name string) string {
|
||||
return name.replace('.', '_')
|
||||
}
|
||||
|
||||
// remove underscores and extension
|
||||
pub fn name_fix_no_underscore_no_ext(name_ string) string {
|
||||
return name_fix_keepext(name_).all_before_last('.').replace('_', '')
|
||||
// normalize a file path while preserving path structure
|
||||
pub fn path_fix(path_ string) string {
|
||||
if path_.len == 0 {
|
||||
return ''
|
||||
}
|
||||
return "${path_.trim('/')}"
|
||||
}
|
||||
|
||||
// normalize a file path while preserving path structure
|
||||
pub fn path_fix_absolute(path string) string {
|
||||
return "/${path_fix(path)}"
|
||||
}
|
||||
|
||||
|
||||
// remove underscores and extension
|
||||
pub fn name_fix_no_ext(name_ string) string {
|
||||
return name_fix_keepext(name_).all_before_last('.').trim_right('_')
|
||||
|
||||
@@ -6,3 +6,33 @@ fn test_main() {
|
||||
assert name_fix_keepext('\$sds_?_!"`{_ 4F') == 'sds_4f'
|
||||
assert name_fix_keepext('\$sds_?_!"`{_ 4F.jpg') == 'sds_4f.jpg'
|
||||
}
|
||||
|
||||
fn test_path_fix() {
|
||||
// Test empty path
|
||||
assert path_fix('') == ''
|
||||
|
||||
// Test absolute paths
|
||||
assert path_fix('/home/user') == '/home/user'
|
||||
assert path_fix('/home/USER') == '/home/user'
|
||||
assert path_fix('/home/user/Documents') == '/home/user/documents'
|
||||
|
||||
// Test relative paths
|
||||
assert path_fix('home/user') == 'home/user'
|
||||
assert path_fix('./home/user') == './home/user'
|
||||
assert path_fix('../home/user') == '../home/user'
|
||||
|
||||
// Test paths with special characters
|
||||
assert path_fix('/home/user/My Documents') == '/home/user/my_documents'
|
||||
assert path_fix('/home/user/file-name.txt') == '/home/user/file_name.txt'
|
||||
assert path_fix('/home/user/file name with spaces.txt') == '/home/user/file_name_with_spaces.txt'
|
||||
|
||||
// Test paths with multiple special characters
|
||||
assert path_fix('/home/user/!@#$%^&*()_+.txt') == '/home/user/'
|
||||
|
||||
// Test paths with multiple components and extensions
|
||||
assert path_fix('/home/user/Documents/report.pdf') == '/home/user/documents/report.pdf'
|
||||
assert path_fix('/home/user/Documents/report.PDF') == '/home/user/documents/report.pdf'
|
||||
|
||||
// Test paths with multiple slashes
|
||||
assert path_fix('/home//user///documents') == '/home/user/documents'
|
||||
}
|
||||
|
||||
@@ -75,7 +75,6 @@ pub fn (mut db OurDB) set_(x u32, old_location Location, data []u8) ! {
|
||||
file_nr: file_nr
|
||||
position: u32(db.file.tell()!)
|
||||
}
|
||||
println('Writing ${x} data at position: ${new_location.position}, size: ${data.len}')
|
||||
|
||||
// Calculate CRC of data
|
||||
crc := calculate_crc(data)
|
||||
@@ -120,18 +119,15 @@ fn (mut db OurDB) get_(location Location) ![]u8 {
|
||||
db.db_file_select(location.file_nr)!
|
||||
|
||||
if location.position == 0 {
|
||||
return error('Record not found')
|
||||
return error('Record not found, location: ${location}')
|
||||
}
|
||||
|
||||
// Seek to position
|
||||
db.file.seek(i64(location.position), .start)!
|
||||
|
||||
// Read header
|
||||
mut header := []u8{len: header_size}
|
||||
header_read_bytes := db.file.read(mut header)!
|
||||
if header_read_bytes != header_size {
|
||||
header := db.file.read_bytes_at(header_size, location.position)
|
||||
if header.len != header_size {
|
||||
return error('failed to read header')
|
||||
}
|
||||
|
||||
// Parse size (2 bytes)
|
||||
size := u16(header[0]) | (u16(header[1]) << 8)
|
||||
|
||||
@@ -139,6 +135,8 @@ fn (mut db OurDB) get_(location Location) ![]u8 {
|
||||
stored_crc := u32(header[2]) | (u32(header[3]) << 8) | (u32(header[4]) << 16) | (u32(header[5]) << 24)
|
||||
|
||||
// Read data
|
||||
// seek data beginning
|
||||
db.file.seek(i64(location.position+12), .start)!
|
||||
mut data := []u8{len: int(size)}
|
||||
data_read_bytes := db.file.read(mut data) or {
|
||||
return error('Failed to read file, ${size} ${err}')
|
||||
|
||||
@@ -149,3 +149,106 @@ You can configure the WebDAV server using the following parameters when calling
|
||||
- Support for advanced WebDAV methods like `LOCK` and `UNLOCK`.
|
||||
- Integration with persistent databases for user credentials.
|
||||
- TLS/SSL support for secure connections.
|
||||
|
||||
|
||||
# WebDAV Property Model
|
||||
|
||||
This file implements the WebDAV property model as defined in [RFC 4918](https://tools.ietf.org/html/rfc4918). It provides a set of property types that represent various WebDAV properties used in PROPFIND and PROPPATCH operations.
|
||||
|
||||
## Overview
|
||||
|
||||
The `model_property.v` file defines:
|
||||
|
||||
1. A `Property` interface that all WebDAV properties must implement
|
||||
2. Various property type implementations for standard WebDAV properties
|
||||
3. Helper functions for XML serialization and time formatting
|
||||
|
||||
## Property Interface
|
||||
|
||||
```v
|
||||
pub interface Property {
|
||||
xml() string
|
||||
xml_name() string
|
||||
}
|
||||
```
|
||||
|
||||
All WebDAV properties must implement:
|
||||
- `xml()`: Returns the full XML representation of the property with its value
|
||||
- `xml_name()`: Returns just the XML tag name of the property (used in property requests)
|
||||
|
||||
## Property Types
|
||||
|
||||
The file implements the following WebDAV property types:
|
||||
|
||||
| Property Type | Description |
|
||||
|---------------|-------------|
|
||||
| `DisplayName` | The display name of a resource |
|
||||
| `GetLastModified` | Last modification time of a resource |
|
||||
| `GetContentType` | MIME type of a resource |
|
||||
| `GetContentLength` | Size of a resource in bytes |
|
||||
| `ResourceType` | Indicates if a resource is a collection (directory) or not |
|
||||
| `CreationDate` | Creation date of a resource |
|
||||
| `SupportedLock` | Lock capabilities supported by the server |
|
||||
| `LockDiscovery` | Active locks on a resource |
|
||||
|
||||
## Helper Functions
|
||||
|
||||
- `fn (p []Property) xml() string`: Generates XML for a list of properties
|
||||
- `fn format_iso8601(t time.Time) string`: Formats a time in ISO8601 format for WebDAV
|
||||
|
||||
## Usage
|
||||
|
||||
These property types are used when responding to WebDAV PROPFIND requests to describe resources in the WebDAV server.
|
||||
|
||||
|
||||
# WebDAV Locker
|
||||
|
||||
This file implements a locking mechanism for resources in a WebDAV context. It provides functionality to manage locks on resources, ensuring that they are not modified by multiple clients simultaneously.
|
||||
|
||||
## Overview
|
||||
|
||||
The `locker.v` file defines:
|
||||
|
||||
1. A `Locker` structure that manages locks for resources.
|
||||
2. A `LockResult` structure that represents the result of a lock operation.
|
||||
3. Methods for locking and unlocking resources, checking lock status, and managing locks.
|
||||
|
||||
## Locker Structure
|
||||
|
||||
```v
|
||||
struct Locker {
|
||||
mut:
|
||||
locks map[string]Lock
|
||||
}
|
||||
```
|
||||
|
||||
- `locks`: A mutable map that stores locks keyed by resource name.
|
||||
|
||||
## LockResult Structure
|
||||
|
||||
```v
|
||||
pub struct LockResult {
|
||||
pub:
|
||||
token string // The lock token
|
||||
is_new_lock bool // Whether this is a new lock or an existing one
|
||||
}
|
||||
```
|
||||
|
||||
- `token`: The unique identifier for the lock.
|
||||
- `is_new_lock`: Indicates if this is a new lock or an existing one.
|
||||
|
||||
## Locking and Unlocking
|
||||
|
||||
- `pub fn (mut lm Locker) lock(l Lock) !Lock`: Attempts to lock a resource for a specific owner. Returns a `LockResult` with the lock token and whether it's a new lock.
|
||||
- `pub fn (mut lm Locker) unlock(resource string) bool`: Unlocks a resource by removing its lock.
|
||||
- `pub fn (lm Locker) is_locked(resource string) bool`: Checks if a resource is currently locked.
|
||||
- `pub fn (lm Locker) get_lock(resource string) ?Lock`: Returns the lock object for a resource if it exists and is valid.
|
||||
- `pub fn (mut lm Locker) unlock_with_token(resource string, token string) bool`: Unlocks a resource if the correct token is provided.
|
||||
|
||||
## Recursive Locking
|
||||
|
||||
- `pub fn (mut lm Locker) lock_recursive(l Lock) !Lock`: Locks a resource recursively, allowing for child resources to be locked (implementation for child resources is not complete).
|
||||
|
||||
## Cleanup
|
||||
|
||||
- `pub fn (mut lm Locker) cleanup_expired_locks()`: Cleans up expired locks (implementation is currently commented out).
|
||||
|
||||
@@ -1,206 +0,0 @@
|
||||
module webdav
|
||||
|
||||
import encoding.xml
|
||||
import log
|
||||
import freeflowuniverse.herolib.core.pathlib
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
import os
|
||||
import time
|
||||
import net.http
|
||||
import veb
|
||||
|
||||
// PropfindRequest represents a parsed PROPFIND request
|
||||
pub struct PropfindRequest {
|
||||
pub:
|
||||
typ PropfindType
|
||||
props []string // Property names if typ is prop
|
||||
depth Depth // Depth of the request (0, 1, or -1 for infinity)
|
||||
xml_content string // Original XML content
|
||||
}
|
||||
|
||||
pub enum Depth {
|
||||
infinity = -1
|
||||
zero = 0
|
||||
one = 1
|
||||
}
|
||||
|
||||
// PropfindType represents the type of PROPFIND request
|
||||
pub enum PropfindType {
|
||||
allprop // Request all properties
|
||||
propname // Request property names only
|
||||
prop // Request specific properties
|
||||
invalid // Invalid request
|
||||
}
|
||||
|
||||
// parse_propfind_xml parses the XML body of a PROPFIND request
|
||||
pub fn parse_propfind_xml(req http.Request) !PropfindRequest {
|
||||
|
||||
data := req.data
|
||||
// Parse Depth header
|
||||
depth_str := req.header.get_custom('Depth') or { '0' }
|
||||
depth := parse_depth(depth_str)
|
||||
|
||||
|
||||
if data.len == 0 {
|
||||
// If no body is provided, default to allprop
|
||||
return PropfindRequest{
|
||||
typ: .allprop
|
||||
depth: depth
|
||||
xml_content: ''
|
||||
}
|
||||
}
|
||||
|
||||
doc := xml.XMLDocument.from_string(data) or {
|
||||
return error('Failed to parse XML: ${err}')
|
||||
}
|
||||
|
||||
root := doc.root
|
||||
if root.name.to_lower() != 'propfind' && !root.name.ends_with(':propfind') {
|
||||
return error('Invalid PROPFIND request: root element must be propfind')
|
||||
}
|
||||
|
||||
mut typ := PropfindType.invalid
|
||||
mut props := []string{}
|
||||
|
||||
// Check for allprop, propname, or prop elements
|
||||
for child in root.children {
|
||||
if child is xml.XMLNode {
|
||||
node := child as xml.XMLNode
|
||||
|
||||
// Check for allprop
|
||||
if node.name == 'allprop' || node.name == 'D:allprop' {
|
||||
typ = .allprop
|
||||
break
|
||||
}
|
||||
|
||||
// Check for propname
|
||||
if node.name == 'propname' || node.name == 'D:propname' {
|
||||
typ = .propname
|
||||
break
|
||||
}
|
||||
|
||||
// Check for prop
|
||||
if node.name == 'prop' || node.name == 'D:prop' {
|
||||
typ = .prop
|
||||
|
||||
// Extract property names
|
||||
for prop_child in node.children {
|
||||
if prop_child is xml.XMLNode {
|
||||
prop_node := prop_child as xml.XMLNode
|
||||
props << prop_node.name
|
||||
}
|
||||
}
|
||||
break
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if typ == .invalid {
|
||||
return error('Invalid PROPFIND request: missing prop, allprop, or propname element')
|
||||
}
|
||||
|
||||
return PropfindRequest{
|
||||
typ: typ
|
||||
props: props
|
||||
depth: depth
|
||||
xml_content: data
|
||||
}
|
||||
}
|
||||
|
||||
// parse_depth parses the Depth header value
|
||||
pub fn parse_depth(depth_str string) Depth {
|
||||
if depth_str == 'infinity' { return .infinity}
|
||||
else if depth_str == '0' { return .zero}
|
||||
else if depth_str == '1' { return .one}
|
||||
else {
|
||||
log.warn('[WebDAV] Invalid Depth header value: ${depth_str}, defaulting to infinity')
|
||||
return .infinity
|
||||
}
|
||||
}
|
||||
|
||||
// returns the properties of a filesystem entry
|
||||
fn get_properties(entry &vfs.FSEntry) []Property {
|
||||
mut props := []Property{}
|
||||
|
||||
metadata := entry.get_metadata()
|
||||
|
||||
// Display name
|
||||
props << DisplayName(metadata.name)
|
||||
props << GetLastModified(format_iso8601(metadata.modified_time()))
|
||||
props << GetContentType(if entry.is_dir() {'httpd/unix-directory'} else {get_file_content_type(entry.get_path())})
|
||||
props << ResourceType(entry.is_dir())
|
||||
|
||||
// Content length (only for files)
|
||||
if !entry.is_dir() {
|
||||
props << GetContentLength(metadata.size.str())
|
||||
}
|
||||
|
||||
// Creation date
|
||||
props << CreationDate(format_iso8601(metadata.created_time()))
|
||||
return props
|
||||
}
|
||||
|
||||
// Response represents a WebDAV response for a resource
|
||||
pub struct Response {
|
||||
pub:
|
||||
href string
|
||||
found_props []Property
|
||||
not_found_props []Property
|
||||
}
|
||||
|
||||
fn (r Response) xml() string {
|
||||
return '<D:response>\n<D:href>${r.href}</D:href>
|
||||
<D:propstat><D:prop>${r.found_props.map(it.xml()).join_lines()}</D:prop><D:status>HTTP/1.1 200 OK</D:status></D:propstat>
|
||||
</D:response>'
|
||||
}
|
||||
|
||||
// generate_propfind_response generates a PROPFIND response XML string from Response structs
|
||||
pub fn (r []Response) xml () string {
|
||||
return '<?xml version="1.0" encoding="UTF-8"?>\n<D:multistatus xmlns:D="DAV:">
|
||||
${r.map(it.xml()).join_lines()}\n</D:multistatus>'
|
||||
}
|
||||
|
||||
fn get_file_content_type(path string) string {
|
||||
ext := path.all_after_last('.')
|
||||
content_type := if v := veb.mime_types[ext] {
|
||||
v
|
||||
} else {
|
||||
'text/plain; charset=utf-8'
|
||||
}
|
||||
|
||||
return content_type
|
||||
}
|
||||
|
||||
// get_responses returns all properties for the given path and depth
|
||||
fn (mut app App) get_responses(entry vfs.FSEntry, req PropfindRequest) ![]Response {
|
||||
mut responses := []Response{}
|
||||
|
||||
path := if entry.is_dir() && entry.get_path() != '/' {
|
||||
'${entry.get_path()}/'
|
||||
} else {
|
||||
entry.get_path()
|
||||
}
|
||||
log.debug('Finfing for ${path}')
|
||||
// main entry response
|
||||
responses << Response {
|
||||
href: path
|
||||
// not_found: entry.get_unfound_properties(req)
|
||||
found_props: get_properties(entry)
|
||||
}
|
||||
|
||||
if !entry.is_dir() || req.depth == .zero {
|
||||
return responses
|
||||
}
|
||||
|
||||
entries := app.vfs.dir_list(path) or {
|
||||
log.error('Failed to list directory for ${path} ${err}')
|
||||
return responses }
|
||||
for e in entries {
|
||||
responses << app.get_responses(e, PropfindRequest {
|
||||
...req,
|
||||
depth: if req.depth == .one { .zero } else { .infinity }
|
||||
})!
|
||||
}
|
||||
return responses
|
||||
}
|
||||
@@ -5,10 +5,10 @@ import freeflowuniverse.herolib.ui.console
|
||||
import freeflowuniverse.herolib.vfs
|
||||
|
||||
@[heap]
|
||||
pub struct App {
|
||||
pub struct Server {
|
||||
veb.Middleware[Context]
|
||||
pub mut:
|
||||
lock_manager LockManager
|
||||
lock_manager Locker
|
||||
user_db map[string]string @[required]
|
||||
vfs vfs.VFSImplementation
|
||||
}
|
||||
@@ -18,23 +18,23 @@ pub struct Context {
|
||||
}
|
||||
|
||||
@[params]
|
||||
pub struct AppArgs {
|
||||
pub struct ServerArgs {
|
||||
pub mut:
|
||||
user_db map[string]string @[required]
|
||||
vfs vfs.VFSImplementation
|
||||
}
|
||||
|
||||
pub fn new_app(args AppArgs) !&App {
|
||||
mut app := &App{
|
||||
pub fn new_server(args ServerArgs) !&Server {
|
||||
mut server := &Server{
|
||||
user_db: args.user_db.clone()
|
||||
vfs: args.vfs
|
||||
}
|
||||
|
||||
// register middlewares for all routes
|
||||
app.use(handler: app.auth_middleware)
|
||||
app.use(handler: middleware_log_request)
|
||||
app.use(handler: middleware_log_response, after: true)
|
||||
return app
|
||||
server.use(handler: server.auth_middleware)
|
||||
server.use(handler: middleware_log_request)
|
||||
server.use(handler: middleware_log_response, after: true)
|
||||
return server
|
||||
}
|
||||
|
||||
@[params]
|
||||
@@ -44,11 +44,11 @@ pub mut:
|
||||
background bool
|
||||
}
|
||||
|
||||
pub fn (mut app App) run(params RunParams) {
|
||||
pub fn (mut server Server) run(params RunParams) {
|
||||
console.print_green('Running the server on port: ${params.port}')
|
||||
if params.background {
|
||||
spawn veb.run[App, Context](mut app, params.port)
|
||||
spawn veb.run[Server, Context](mut server, params.port)
|
||||
} else {
|
||||
veb.run[App, Context](mut app, params.port)
|
||||
veb.run[Server, Context](mut server, params.port)
|
||||
}
|
||||
}
|
||||
22
lib/dav/webdav/factory_test.v
Normal file
22
lib/dav/webdav/factory_test.v
Normal file
@@ -0,0 +1,22 @@
|
||||
module webdav
|
||||
|
||||
import net.http
|
||||
import freeflowuniverse.herolib.core.pathlib
|
||||
import time
|
||||
import freeflowuniverse.herolib.data.ourdb
|
||||
import encoding.base64
|
||||
import rand
|
||||
import os
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
|
||||
const testdata_path := os.join_path(os.dir(@FILE), 'testdata')
|
||||
const database_path := os.join_path(testdata_path, 'database')
|
||||
|
||||
fn test_new_server() {
|
||||
mut metadata_db := ourdb.new(path:os.join_path(database_path, 'metadata'))!
|
||||
mut data_db := ourdb.new(path:os.join_path(database_path, 'data'))!
|
||||
mut vfs := vfs_db.new(mut metadata_db, mut data_db)!
|
||||
server := new_server(vfs: vfs, user_db: {
|
||||
'admin': '123'
|
||||
})!
|
||||
}
|
||||
@@ -3,7 +3,7 @@ module webdav
|
||||
import time
|
||||
import rand
|
||||
|
||||
struct LockManager {
|
||||
struct Locker {
|
||||
mut:
|
||||
locks map[string]Lock
|
||||
}
|
||||
@@ -18,7 +18,7 @@ pub:
|
||||
// lock attempts to lock a resource for a specific owner
|
||||
// Returns a LockResult with the lock token and whether it's a new lock
|
||||
// Returns an error if the resource is already locked by a different owner
|
||||
pub fn (mut lm LockManager) lock(l Lock) !Lock {
|
||||
pub fn (mut lm Locker) lock(l Lock) !Lock {
|
||||
if l.resource in lm.locks {
|
||||
// Check if the lock is still valid
|
||||
existing_lock := lm.locks[l.resource]
|
||||
@@ -54,7 +54,7 @@ pub fn (mut lm LockManager) lock(l Lock) !Lock {
|
||||
return new_lock
|
||||
}
|
||||
|
||||
pub fn (mut lm LockManager) unlock(resource string) bool {
|
||||
pub fn (mut lm Locker) unlock(resource string) bool {
|
||||
if resource in lm.locks {
|
||||
lm.locks.delete(resource)
|
||||
return true
|
||||
@@ -63,7 +63,7 @@ pub fn (mut lm LockManager) unlock(resource string) bool {
|
||||
}
|
||||
|
||||
// is_locked checks if a resource is currently locked
|
||||
pub fn (lm LockManager) is_locked(resource string) bool {
|
||||
pub fn (lm Locker) is_locked(resource string) bool {
|
||||
if resource in lm.locks {
|
||||
lock_ := lm.locks[resource]
|
||||
// Check if lock is expired
|
||||
@@ -76,7 +76,7 @@ pub fn (lm LockManager) is_locked(resource string) bool {
|
||||
}
|
||||
|
||||
// get_lock returns the Lock object for a resource if it exists and is valid
|
||||
pub fn (lm LockManager) get_lock(resource string) ?Lock {
|
||||
pub fn (lm Locker) get_lock(resource string) ?Lock {
|
||||
if resource in lm.locks {
|
||||
lock_ := lm.locks[resource]
|
||||
// Check if lock is expired
|
||||
@@ -88,7 +88,7 @@ pub fn (lm LockManager) get_lock(resource string) ?Lock {
|
||||
return none
|
||||
}
|
||||
|
||||
pub fn (mut lm LockManager) unlock_with_token(resource string, token string) bool {
|
||||
pub fn (mut lm Locker) unlock_with_token(resource string, token string) bool {
|
||||
if resource in lm.locks {
|
||||
lock_ := lm.locks[resource]
|
||||
if lock_.token == token {
|
||||
@@ -99,7 +99,7 @@ pub fn (mut lm LockManager) unlock_with_token(resource string, token string) boo
|
||||
return false
|
||||
}
|
||||
|
||||
fn (mut lm LockManager) lock_recursive(l Lock) !Lock {
|
||||
fn (mut lm Locker) lock_recursive(l Lock) !Lock {
|
||||
if l.depth == 0 {
|
||||
return lm.lock(l)
|
||||
}
|
||||
@@ -108,7 +108,7 @@ fn (mut lm LockManager) lock_recursive(l Lock) !Lock {
|
||||
return lm.lock(l)
|
||||
}
|
||||
|
||||
pub fn (mut lm LockManager) cleanup_expired_locks() {
|
||||
pub fn (mut lm Locker) cleanup_expired_locks() {
|
||||
// now := time.now().unix()
|
||||
// lm.locks
|
||||
// lm.locks = lm.locks.filter(it.value.created_at.unix() + it.value.timeout > now)
|
||||
80
lib/dav/webdav/locker_test.v
Normal file
80
lib/dav/webdav/locker_test.v
Normal file
@@ -0,0 +1,80 @@
|
||||
module webdav
|
||||
|
||||
import time
|
||||
import rand
|
||||
|
||||
fn test_lock() {
|
||||
mut locker := Locker{locks: map[string]Lock{}}
|
||||
|
||||
// Lock the resource
|
||||
result := locker.lock(
|
||||
resource: 'test-resource',
|
||||
owner: 'test-owner',
|
||||
depth: 0,
|
||||
timeout: 3600,
|
||||
) or { panic(err) }
|
||||
assert result.token != ''
|
||||
assert locker.is_locked('test-resource')
|
||||
}
|
||||
|
||||
fn test_unlock() {
|
||||
mut locker := Locker{locks: map[string]Lock{}}
|
||||
|
||||
// Lock the resource
|
||||
locker.lock(
|
||||
resource: 'test-resource',
|
||||
owner: 'test-owner',
|
||||
depth: 0,
|
||||
timeout: 3600,
|
||||
) or { panic(err) }
|
||||
|
||||
// Unlock the resource
|
||||
is_unlocked := locker.unlock('test-resource')
|
||||
assert is_unlocked
|
||||
assert !locker.is_locked('test-resource')
|
||||
}
|
||||
|
||||
fn test_lock_with_different_owner() {
|
||||
mut locker := Locker{locks: map[string]Lock{}}
|
||||
lock1 := Lock{
|
||||
resource: 'test-resource',
|
||||
owner: 'owner1',
|
||||
depth: 0,
|
||||
timeout: 3600,
|
||||
}
|
||||
lock2 := Lock{
|
||||
resource: 'test-resource',
|
||||
owner: 'owner2',
|
||||
depth: 0,
|
||||
timeout: 3600,
|
||||
}
|
||||
|
||||
// Lock the resource with the first owner
|
||||
locker.lock(lock1) or { panic(err) }
|
||||
|
||||
// Attempt to lock the resource with a different owner
|
||||
if result := locker.lock(lock2) {
|
||||
assert false, 'locking should fail'
|
||||
} else {
|
||||
assert err == error('Resource is already locked by a different owner')
|
||||
}
|
||||
}
|
||||
|
||||
fn test_cleanup_expired_locks() {
|
||||
mut locker := Locker{locks: map[string]Lock{}}
|
||||
|
||||
// Lock the resource
|
||||
locker.lock(
|
||||
resource: 'test-resource',
|
||||
owner: 'test-owner',
|
||||
depth: 0,
|
||||
timeout: 1,
|
||||
) or { panic(err) }
|
||||
|
||||
// Wait for the lock to expire
|
||||
time.sleep(2 * time.second)
|
||||
|
||||
// Cleanup expired locks
|
||||
locker.cleanup_expired_locks()
|
||||
assert !locker.is_locked('test-resource')
|
||||
}
|
||||
@@ -1,39 +0,0 @@
|
||||
import freeflowuniverse.herolib.dav.webdav
|
||||
import freeflowuniverse.herolib.vfs.vfs_nested
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
import os
|
||||
|
||||
fn test_logic() ! {
|
||||
println('Testing OurDB VFS Logic to WebDAV Server...')
|
||||
|
||||
// Create test directories
|
||||
test_data_dir := os.join_path(os.temp_dir(), 'vfs_db_test_data')
|
||||
test_meta_dir := os.join_path(os.temp_dir(), 'vfs_db_test_meta')
|
||||
|
||||
os.mkdir_all(test_data_dir)!
|
||||
os.mkdir_all(test_meta_dir)!
|
||||
|
||||
defer {
|
||||
os.rmdir_all(test_data_dir) or {}
|
||||
os.rmdir_all(test_meta_dir) or {}
|
||||
}
|
||||
|
||||
// Create VFS instance; lower level VFS Implementations that use OurDB
|
||||
mut vfs1 := vfs_db.new(test_data_dir, test_meta_dir)!
|
||||
|
||||
mut high_level_vfs := vfsnested.new()
|
||||
|
||||
// Nest OurDB VFS instances at different paths
|
||||
high_level_vfs.add_vfs('/', vfs1) or { panic(err) }
|
||||
|
||||
// Test directory listing
|
||||
entries := high_level_vfs.dir_list('/')!
|
||||
assert entries.len == 1 // Data directory
|
||||
|
||||
// // Check if dir is existing
|
||||
// assert high_level_vfs.exists('/') == true
|
||||
|
||||
// // Check if dir is not existing
|
||||
// assert high_level_vfs.exists('/data') == true
|
||||
}
|
||||
@@ -2,7 +2,7 @@ module webdav
|
||||
|
||||
import encoding.base64
|
||||
|
||||
fn (app &App) auth_middleware(mut ctx Context) bool {
|
||||
fn (server &Server) auth_middleware(mut ctx Context) bool {
|
||||
// return true
|
||||
auth_header := ctx.get_header(.authorization) or {
|
||||
ctx.res.set_status(.unauthorized)
|
||||
@@ -33,7 +33,7 @@ fn (app &App) auth_middleware(mut ctx Context) bool {
|
||||
}
|
||||
username := split_credentials[0]
|
||||
hashed_pass := split_credentials[1]
|
||||
if user := app.user_db[username] {
|
||||
if user := server.user_db[username] {
|
||||
if user != hashed_pass {
|
||||
ctx.res.set_status(.unauthorized)
|
||||
ctx.res.header.add(.www_authenticate, 'Basic realm="WebDAV Server"')
|
||||
|
||||
@@ -9,7 +9,7 @@ fn middleware_log_request(mut ctx Context) bool {
|
||||
}
|
||||
|
||||
fn middleware_log_response(mut ctx Context) bool {
|
||||
log.debug('[WebDAV] Response: ${ctx.req.url} ${ctx.res.header}\n')
|
||||
log.debug('[WebDAV] Response: ${ctx.req.url} ${ctx.res.status()}\n')
|
||||
return true
|
||||
}
|
||||
|
||||
@@ -3,7 +3,7 @@ module webdav
|
||||
import encoding.xml
|
||||
import time
|
||||
|
||||
pub struct Lock {
|
||||
struct Lock {
|
||||
pub mut:
|
||||
resource string
|
||||
owner string
|
||||
|
||||
@@ -1,48 +0,0 @@
|
||||
# WebDAV Property Model
|
||||
|
||||
This file implements the WebDAV property model as defined in [RFC 4918](https://tools.ietf.org/html/rfc4918). It provides a set of property types that represent various WebDAV properties used in PROPFIND and PROPPATCH operations.
|
||||
|
||||
## Overview
|
||||
|
||||
The `model_property.v` file defines:
|
||||
|
||||
1. A `Property` interface that all WebDAV properties must implement
|
||||
2. Various property type implementations for standard WebDAV properties
|
||||
3. Helper functions for XML serialization and time formatting
|
||||
|
||||
## Property Interface
|
||||
|
||||
```v
|
||||
pub interface Property {
|
||||
xml() string
|
||||
xml_name() string
|
||||
}
|
||||
```
|
||||
|
||||
All WebDAV properties must implement:
|
||||
- `xml()`: Returns the full XML representation of the property with its value
|
||||
- `xml_name()`: Returns just the XML tag name of the property (used in property requests)
|
||||
|
||||
## Property Types
|
||||
|
||||
The file implements the following WebDAV property types:
|
||||
|
||||
| Property Type | Description |
|
||||
|---------------|-------------|
|
||||
| `DisplayName` | The display name of a resource |
|
||||
| `GetLastModified` | Last modification time of a resource |
|
||||
| `GetContentType` | MIME type of a resource |
|
||||
| `GetContentLength` | Size of a resource in bytes |
|
||||
| `ResourceType` | Indicates if a resource is a collection (directory) or not |
|
||||
| `CreationDate` | Creation date of a resource |
|
||||
| `SupportedLock` | Lock capabilities supported by the server |
|
||||
| `LockDiscovery` | Active locks on a resource |
|
||||
|
||||
## Helper Functions
|
||||
|
||||
- `fn (p []Property) xml() string`: Generates XML for a list of properties
|
||||
- `fn format_iso8601(t time.Time) string`: Formats a time in ISO8601 format for WebDAV
|
||||
|
||||
## Usage
|
||||
|
||||
These property types are used when responding to WebDAV PROPFIND requests to describe resources in the WebDAV server.
|
||||
112
lib/dav/webdav/model_property.v
Normal file
112
lib/dav/webdav/model_property.v
Normal file
@@ -0,0 +1,112 @@
|
||||
module webdav
|
||||
|
||||
import encoding.xml
|
||||
import log
|
||||
import freeflowuniverse.herolib.core.pathlib
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import os
|
||||
import time
|
||||
import veb
|
||||
|
||||
// Property represents a WebDAV property
|
||||
pub interface Property {
|
||||
xml() string
|
||||
xml_name() string
|
||||
}
|
||||
|
||||
type DisplayName = string
|
||||
type GetLastModified = string
|
||||
type GetContentType = string
|
||||
type GetContentLength = string
|
||||
type ResourceType = bool
|
||||
type CreationDate = string
|
||||
type SupportedLock = string
|
||||
type LockDiscovery = string
|
||||
|
||||
fn (p []Property) xml() string {
|
||||
return '<D:propstat>
|
||||
<D:prop>${p.map(it.xml()).join_lines()}</D:prop>
|
||||
<D:status>HTTP/1.1 200 OK</D:status>
|
||||
</D:propstat>'
|
||||
}
|
||||
|
||||
fn (p DisplayName) xml() string {
|
||||
return '<D:displayname>${p}</D:displayname>'
|
||||
}
|
||||
|
||||
fn (p DisplayName) xml_name() string {
|
||||
return '<displayname/>'
|
||||
}
|
||||
|
||||
fn (p GetLastModified) xml() string {
|
||||
return '<D:getlastmodified>${p}</D:getlastmodified>'
|
||||
}
|
||||
|
||||
fn (p GetLastModified) xml_name() string {
|
||||
return '<getlastmodified/>'
|
||||
}
|
||||
|
||||
fn (p GetContentType) xml() string {
|
||||
return '<D:getcontenttype>${p}</D:getcontenttype>'
|
||||
}
|
||||
|
||||
fn (p GetContentType) xml_name() string {
|
||||
return '<getcontenttype/>'
|
||||
}
|
||||
|
||||
fn (p GetContentLength) xml() string {
|
||||
return '<D:getcontentlength>${p}</D:getcontentlength>'
|
||||
}
|
||||
|
||||
fn (p GetContentLength) xml_name() string {
|
||||
return '<getcontentlength/>'
|
||||
}
|
||||
|
||||
fn (p ResourceType) xml() string {
|
||||
return if p {
|
||||
'<D:resourcetype><D:collection/></D:resourcetype>'
|
||||
} else {
|
||||
'<D:resourcetype/>'
|
||||
}
|
||||
}
|
||||
|
||||
fn (p ResourceType) xml_name() string {
|
||||
return '<resourcetype/>'
|
||||
}
|
||||
|
||||
fn (p CreationDate) xml() string {
|
||||
return '<D:creationdate>${p}</D:creationdate>'
|
||||
}
|
||||
|
||||
fn (p CreationDate) xml_name() string {
|
||||
return '<creationdate/>'
|
||||
}
|
||||
|
||||
fn (p SupportedLock) xml() string {
|
||||
return '<D:supportedlock>
|
||||
<D:lockentry>
|
||||
<D:lockscope><D:exclusive/></D:lockscope>
|
||||
<D:locktype><D:write/></D:locktype>
|
||||
</D:lockentry>
|
||||
<D:lockentry>
|
||||
<D:lockscope><D:shared/></D:lockscope>
|
||||
<D:locktype><D:write/></D:locktype>
|
||||
</D:lockentry>
|
||||
</D:supportedlock>'
|
||||
}
|
||||
|
||||
fn (p SupportedLock) xml_name() string {
|
||||
return '<supportedlock/>'
|
||||
}
|
||||
|
||||
fn (p LockDiscovery) xml() string {
|
||||
return '<D:lockdiscovery>${p}</D:lockdiscovery>'
|
||||
}
|
||||
|
||||
fn (p LockDiscovery) xml_name() string {
|
||||
return '<lockdiscovery/>'
|
||||
}
|
||||
|
||||
fn format_iso8601(t time.Time) string {
|
||||
return '${t.year:04d}-${t.month:02d}-${t.day:02d}T${t.hour:02d}:${t.minute:02d}:${t.second:02d}Z'
|
||||
}
|
||||
@@ -4,109 +4,148 @@ import encoding.xml
|
||||
import log
|
||||
import freeflowuniverse.herolib.core.pathlib
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
import os
|
||||
import time
|
||||
import net.http
|
||||
import veb
|
||||
|
||||
// Property represents a WebDAV property
|
||||
pub interface Property {
|
||||
xml() string
|
||||
xml_name() string
|
||||
// PropfindRequest represents a parsed PROPFIND request
|
||||
pub struct PropfindRequest {
|
||||
pub:
|
||||
typ PropfindType
|
||||
props []string // Property names if typ is prop
|
||||
depth Depth // Depth of the request (0, 1, or -1 for infinity)
|
||||
xml_content string // Original XML content
|
||||
}
|
||||
|
||||
type DisplayName = string
|
||||
type GetLastModified = string
|
||||
type GetContentType = string
|
||||
type GetContentLength = string
|
||||
type ResourceType = bool
|
||||
type CreationDate = string
|
||||
type SupportedLock = string
|
||||
type LockDiscovery = string
|
||||
|
||||
fn (p []Property) xml() string {
|
||||
return '<D:propstat>
|
||||
<D:prop>${p.map(it.xml()).join_lines()}</D:prop>
|
||||
<D:status>HTTP/1.1 200 OK</D:status>
|
||||
</D:propstat>'
|
||||
pub enum Depth {
|
||||
infinity = -1
|
||||
zero = 0
|
||||
one = 1
|
||||
}
|
||||
|
||||
fn (p DisplayName) xml() string {
|
||||
return '<D:displayname>${p}</D:displayname>'
|
||||
// PropfindType represents the type of PROPFIND request
|
||||
pub enum PropfindType {
|
||||
allprop // Request all properties
|
||||
propname // Request property names only
|
||||
prop // Request specific properties
|
||||
invalid // Invalid request
|
||||
}
|
||||
|
||||
fn (p DisplayName) xml_name() string {
|
||||
return '<displayname/>'
|
||||
}
|
||||
// parse_propfind_xml parses the XML body of a PROPFIND request
|
||||
pub fn parse_propfind_xml(req http.Request) !PropfindRequest {
|
||||
|
||||
fn (p GetLastModified) xml() string {
|
||||
return '<D:getlastmodified>${p}</D:getlastmodified>'
|
||||
}
|
||||
data := req.data
|
||||
// Parse Depth header
|
||||
depth_str := req.header.get_custom('Depth') or { '0' }
|
||||
depth := parse_depth(depth_str)
|
||||
|
||||
|
||||
fn (p GetLastModified) xml_name() string {
|
||||
return '<getlastmodified/>'
|
||||
}
|
||||
if data.len == 0 {
|
||||
// If no body is provided, default to allprop
|
||||
return PropfindRequest{
|
||||
typ: .allprop
|
||||
depth: depth
|
||||
xml_content: ''
|
||||
}
|
||||
}
|
||||
|
||||
fn (p GetContentType) xml() string {
|
||||
return '<D:getcontenttype>${p}</D:getcontenttype>'
|
||||
}
|
||||
doc := xml.XMLDocument.from_string(data) or {
|
||||
return error('Failed to parse XML: ${err}')
|
||||
}
|
||||
|
||||
fn (p GetContentType) xml_name() string {
|
||||
return '<getcontenttype/>'
|
||||
}
|
||||
root := doc.root
|
||||
if root.name.to_lower() != 'propfind' && !root.name.ends_with(':propfind') {
|
||||
return error('Invalid PROPFIND request: root element must be propfind')
|
||||
}
|
||||
|
||||
fn (p GetContentLength) xml() string {
|
||||
return '<D:getcontentlength>${p}</D:getcontentlength>'
|
||||
}
|
||||
mut typ := PropfindType.invalid
|
||||
mut props := []string{}
|
||||
|
||||
// Check for allprop, propname, or prop elements
|
||||
for child in root.children {
|
||||
if child is xml.XMLNode {
|
||||
node := child as xml.XMLNode
|
||||
|
||||
// Check for allprop
|
||||
if node.name == 'allprop' || node.name == 'D:allprop' {
|
||||
typ = .allprop
|
||||
break
|
||||
}
|
||||
|
||||
// Check for propname
|
||||
if node.name == 'propname' || node.name == 'D:propname' {
|
||||
typ = .propname
|
||||
break
|
||||
}
|
||||
|
||||
// Check for prop
|
||||
if node.name == 'prop' || node.name == 'D:prop' {
|
||||
typ = .prop
|
||||
|
||||
// Extract property names
|
||||
for prop_child in node.children {
|
||||
if prop_child is xml.XMLNode {
|
||||
prop_node := prop_child as xml.XMLNode
|
||||
props << prop_node.name
|
||||
}
|
||||
}
|
||||
break
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if typ == .invalid {
|
||||
return error('Invalid PROPFIND request: missing prop, allprop, or propname element')
|
||||
}
|
||||
|
||||
fn (p GetContentLength) xml_name() string {
|
||||
return '<getcontentlength/>'
|
||||
}
|
||||
|
||||
fn (p ResourceType) xml() string {
|
||||
return if p {
|
||||
'<D:resourcetype><D:collection/></D:resourcetype>'
|
||||
} else {
|
||||
'<D:resourcetype/>'
|
||||
return PropfindRequest{
|
||||
typ: typ
|
||||
props: props
|
||||
depth: depth
|
||||
xml_content: data
|
||||
}
|
||||
}
|
||||
|
||||
fn (p ResourceType) xml_name() string {
|
||||
return '<resourcetype/>'
|
||||
// parse_depth parses the Depth header value
|
||||
pub fn parse_depth(depth_str string) Depth {
|
||||
if depth_str == 'infinity' { return .infinity}
|
||||
else if depth_str == '0' { return .zero}
|
||||
else if depth_str == '1' { return .one}
|
||||
else {
|
||||
log.warn('[WebDAV] Invalid Depth header value: ${depth_str}, defaulting to infinity')
|
||||
return .infinity
|
||||
}
|
||||
}
|
||||
|
||||
fn (p CreationDate) xml() string {
|
||||
return '<D:creationdate>${p}</D:creationdate>'
|
||||
// Response represents a WebDAV response for a resource
|
||||
pub struct Response {
|
||||
pub:
|
||||
href string
|
||||
found_props []Property
|
||||
not_found_props []Property
|
||||
}
|
||||
|
||||
fn (p CreationDate) xml_name() string {
|
||||
return '<creationdate/>'
|
||||
fn (r Response) xml() string {
|
||||
return '<D:response>\n<D:href>${r.href}</D:href>
|
||||
<D:propstat><D:prop>${r.found_props.map(it.xml()).join_lines()}</D:prop><D:status>HTTP/1.1 200 OK</D:status></D:propstat>
|
||||
</D:response>'
|
||||
}
|
||||
|
||||
fn (p SupportedLock) xml() string {
|
||||
return '<D:supportedlock>
|
||||
<D:lockentry>
|
||||
<D:lockscope><D:exclusive/></D:lockscope>
|
||||
<D:locktype><D:write/></D:locktype>
|
||||
</D:lockentry>
|
||||
<D:lockentry>
|
||||
<D:lockscope><D:shared/></D:lockscope>
|
||||
<D:locktype><D:write/></D:locktype>
|
||||
</D:lockentry>
|
||||
</D:supportedlock>'
|
||||
// generate_propfind_response generates a PROPFIND response XML string from Response structs
|
||||
pub fn (r []Response) xml () string {
|
||||
return '<?xml version="1.0" encoding="UTF-8"?>\n<D:multistatus xmlns:D="DAV:">
|
||||
${r.map(it.xml()).join_lines()}\n</D:multistatus>'
|
||||
}
|
||||
|
||||
fn (p SupportedLock) xml_name() string {
|
||||
return '<supportedlock/>'
|
||||
}
|
||||
fn get_file_content_type(path string) string {
|
||||
ext := path.all_after_last('.')
|
||||
content_type := if v := veb.mime_types[ext] {
|
||||
v
|
||||
} else {
|
||||
'text/plain; charset=utf-8'
|
||||
}
|
||||
|
||||
fn (p LockDiscovery) xml() string {
|
||||
return '<D:lockdiscovery>${p}</D:lockdiscovery>'
|
||||
return content_type
|
||||
}
|
||||
|
||||
fn (p LockDiscovery) xml_name() string {
|
||||
return '<lockdiscovery/>'
|
||||
}
|
||||
|
||||
fn format_iso8601(t time.Time) string {
|
||||
return '${t.year:04d}-${t.month:02d}-${t.day:02d}T${t.hour:02d}:${t.minute:02d}:${t.second:02d}Z'
|
||||
}
|
||||
@@ -8,11 +8,22 @@ import veb
|
||||
import log
|
||||
import strings
|
||||
|
||||
@['/:path...'; options]
|
||||
pub fn (app &App) options(mut ctx Context, path string) veb.Result {
|
||||
@[head]
|
||||
pub fn (server &Server) index(mut ctx Context) veb.Result {
|
||||
ctx.set_custom_header('DAV', '1,2') or { return ctx.server_error(err.msg()) }
|
||||
ctx.set_header(.allow, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
|
||||
ctx.set_custom_header('MS-Author-Via', 'DAV') or { return ctx.server_error(err.msg()) }
|
||||
ctx.set_header(.access_control_allow_origin, '*')
|
||||
ctx.set_header(.access_control_allow_methods, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
|
||||
ctx.set_header(.access_control_allow_headers, 'Authorization, Content-Type')
|
||||
ctx.set_header(.content_length, '0')
|
||||
return ctx.ok('')
|
||||
}
|
||||
|
||||
@['/:path...'; options]
|
||||
pub fn (server &Server) options(mut ctx Context, path string) veb.Result {
|
||||
ctx.set_custom_header('DAV', '1,2') or { return ctx.server_error(err.msg()) }
|
||||
ctx.set_header(.allow, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
|
||||
// ctx.set_header(.connection, 'close')
|
||||
ctx.set_custom_header('MS-Author-Via', 'DAV') or { return ctx.server_error(err.msg()) }
|
||||
ctx.set_header(.access_control_allow_origin, '*')
|
||||
ctx.set_header(.access_control_allow_methods, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
|
||||
@@ -22,7 +33,7 @@ pub fn (app &App) options(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
@['/:path...'; lock]
|
||||
pub fn (mut app App) lock(mut ctx Context, path string) veb.Result {
|
||||
pub fn (mut server Server) lock(mut ctx Context, path string) veb.Result {
|
||||
resource := ctx.req.url
|
||||
|
||||
// Parse lock information from XML body instead of headers
|
||||
@@ -52,13 +63,13 @@ pub fn (mut app App) lock(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
// Try to acquire the lock
|
||||
lock_result := app.lock_manager.lock(new_lock) or {
|
||||
lock_result := server.lock_manager.lock(new_lock) or {
|
||||
// If we get here, the resource is locked by a different owner
|
||||
ctx.res.set_status(.locked)
|
||||
return ctx.text('Resource is already locked by a different owner.')
|
||||
}
|
||||
|
||||
log.debug('[WebDAV] Received lock result ${lock_result.xml()}')
|
||||
// log.debug('[WebDAV] Received lock result ${lock_result.xml()}')
|
||||
ctx.res.set_status(.ok)
|
||||
ctx.set_custom_header('Lock-Token', '${lock_result.token}') or { return ctx.server_error(err.msg()) }
|
||||
|
||||
@@ -67,7 +78,7 @@ pub fn (mut app App) lock(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
@['/:path...'; unlock]
|
||||
pub fn (mut app App) unlock(mut ctx Context, path string) veb.Result {
|
||||
pub fn (mut server Server) unlock(mut ctx Context, path string) veb.Result {
|
||||
resource := ctx.req.url
|
||||
token_ := ctx.get_custom_header('Lock-Token') or { return ctx.server_error(err.msg()) }
|
||||
token := token_.trim_string_left('<').trim_string_right('>')
|
||||
@@ -77,7 +88,7 @@ pub fn (mut app App) unlock(mut ctx Context, path string) veb.Result {
|
||||
return ctx.text('Lock failed: `Owner` header missing.')
|
||||
}
|
||||
|
||||
if app.lock_manager.unlock_with_token(resource, token) {
|
||||
if server.lock_manager.unlock_with_token(resource, token) {
|
||||
ctx.res.set_status(.no_content)
|
||||
return ctx.text('Lock successfully released')
|
||||
}
|
||||
@@ -88,34 +99,23 @@ pub fn (mut app App) unlock(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
@['/:path...'; get]
|
||||
pub fn (mut app App) get_file(mut ctx Context, path string) veb.Result {
|
||||
pub fn (mut server Server) get_file(mut ctx Context, path string) veb.Result {
|
||||
log.info('[WebDAV] Getting file ${path}')
|
||||
file_data := app.vfs.file_read(path) or { return ctx.server_error(err.msg()) }
|
||||
file_data := server.vfs.file_read(path) or {
|
||||
log.error('[WebDAV] ${err.msg()}')
|
||||
return ctx.server_error(err.msg())
|
||||
}
|
||||
ext := path.all_after_last('.')
|
||||
content_type := veb.mime_types['.${ext}'] or { 'text/plain' }
|
||||
println('debugzo000 ${file_data.bytestr().len}')
|
||||
println('debugzo001 ${file_data.len}')
|
||||
// ctx.res.header.set(.content_length, file_data.len.str())
|
||||
// ctx.res.set_status(.ok)
|
||||
return ctx.send_response_to_client(content_type, file_data.bytestr())
|
||||
}
|
||||
|
||||
@[head]
|
||||
pub fn (app &App) index(mut ctx Context) veb.Result {
|
||||
ctx.set_custom_header('DAV', '1,2') or { return ctx.server_error(err.msg()) }
|
||||
ctx.set_header(.allow, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
|
||||
ctx.set_custom_header('MS-Author-Via', 'DAV') or { return ctx.server_error(err.msg()) }
|
||||
ctx.set_header(.access_control_allow_origin, '*')
|
||||
ctx.set_header(.access_control_allow_methods, 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE')
|
||||
ctx.set_header(.access_control_allow_headers, 'Authorization, Content-Type')
|
||||
ctx.set_header(.content_length, '0')
|
||||
return ctx.ok('')
|
||||
}
|
||||
|
||||
@['/:path...'; head]
|
||||
pub fn (mut app App) exists(mut ctx Context, path string) veb.Result {
|
||||
pub fn (mut server Server) exists(mut ctx Context, path string) veb.Result {
|
||||
// Check if the requested path exists in the virtual filesystem
|
||||
if !app.vfs.exists(path) {
|
||||
if !server.vfs.exists(path) {
|
||||
return ctx.not_found()
|
||||
}
|
||||
|
||||
@@ -144,19 +144,18 @@ pub fn (mut app App) exists(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
@['/:path...'; delete]
|
||||
pub fn (mut app App) delete(mut ctx Context, path string) veb.Result {
|
||||
app.vfs.delete(path) or {
|
||||
pub fn (mut server Server) delete(mut ctx Context, path string) veb.Result {
|
||||
server.vfs.delete(path) or {
|
||||
return ctx.server_error(err.msg())
|
||||
}
|
||||
|
||||
|
||||
// Return success response
|
||||
return ctx.no_content()
|
||||
}
|
||||
|
||||
@['/:path...'; copy]
|
||||
pub fn (mut app App) copy(mut ctx Context, path string) veb.Result {
|
||||
if !app.vfs.exists(path) {
|
||||
pub fn (mut server Server) copy(mut ctx Context, path string) veb.Result {
|
||||
if !server.vfs.exists(path) {
|
||||
return ctx.not_found()
|
||||
}
|
||||
|
||||
@@ -169,8 +168,10 @@ pub fn (mut app App) copy(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
destination_path_str := destination_url.path
|
||||
|
||||
app.vfs.copy(path, destination_path_str) or {
|
||||
console.print_stderr('failed to copy: ${err}')
|
||||
server.vfs.copy(path, destination_path_str) or {
|
||||
log.set_level(.debug)
|
||||
|
||||
println('[WebDAV] Failed to copy: ${err}')
|
||||
return ctx.server_error(err.msg())
|
||||
}
|
||||
|
||||
@@ -179,8 +180,8 @@ pub fn (mut app App) copy(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
@['/:path...'; move]
|
||||
pub fn (mut app App) move(mut ctx Context, path string) veb.Result {
|
||||
if !app.vfs.exists(path) {
|
||||
pub fn (mut server Server) move(mut ctx Context, path string) veb.Result {
|
||||
if !server.vfs.exists(path) {
|
||||
return ctx.not_found()
|
||||
}
|
||||
|
||||
@@ -194,8 +195,8 @@ pub fn (mut app App) move(mut ctx Context, path string) veb.Result {
|
||||
destination_path_str := destination_url.path
|
||||
|
||||
log.info('[WebDAV] ${@FN} from ${path} to ${destination_path_str}')
|
||||
app.vfs.move(path, destination_path_str) or {
|
||||
console.print_stderr('failed to move: ${err}')
|
||||
server.vfs.move(path, destination_path_str) or {
|
||||
log.error('Failed to move: ${err}')
|
||||
return ctx.server_error(err.msg())
|
||||
}
|
||||
|
||||
@@ -204,14 +205,14 @@ pub fn (mut app App) move(mut ctx Context, path string) veb.Result {
|
||||
}
|
||||
|
||||
@['/:path...'; mkcol]
|
||||
pub fn (mut app App) mkcol(mut ctx Context, path string) veb.Result {
|
||||
if app.vfs.exists(path) {
|
||||
pub fn (mut server Server) mkcol(mut ctx Context, path string) veb.Result {
|
||||
if server.vfs.exists(path) {
|
||||
ctx.res.set_status(.bad_request)
|
||||
return ctx.text('Another collection exists at ${path}')
|
||||
}
|
||||
|
||||
log.info('[WebDAV] Make Collection ${path}')
|
||||
app.vfs.dir_create(path) or {
|
||||
server.vfs.dir_create(path) or {
|
||||
console.print_stderr('failed to create directory ${path}: ${err}')
|
||||
return ctx.server_error(err.msg())
|
||||
}
|
||||
@@ -220,51 +221,10 @@ pub fn (mut app App) mkcol(mut ctx Context, path string) veb.Result {
|
||||
return ctx.text('HTTP 201: Created')
|
||||
}
|
||||
|
||||
@['/:path...'; propfind]
|
||||
fn (mut app App) propfind(mut ctx Context, path string) veb.Result {
|
||||
// Parse PROPFIND request
|
||||
propfind_req := parse_propfind_xml(ctx.req) or {
|
||||
return ctx.error(WebDAVError{
|
||||
status: .bad_request
|
||||
message: 'Failed to parse PROPFIND XML: ${err}'
|
||||
tag: 'propfind-parse-error'
|
||||
})
|
||||
}
|
||||
|
||||
log.debug('[WebDAV] Propfind Request: ${propfind_req.typ} ${propfind_req.depth}')
|
||||
|
||||
|
||||
// Check if resource is locked
|
||||
if app.lock_manager.is_locked(ctx.req.url) {
|
||||
// If the resource is locked, we should still return properties
|
||||
// but we might need to indicate the lock status in the response
|
||||
// This is handled in the property generation
|
||||
log.info('[WebDAV] Resource is locked: ${ctx.req.url}')
|
||||
}
|
||||
|
||||
entry := app.vfs.get(path) or {
|
||||
return ctx.error(
|
||||
status: .not_found
|
||||
message: 'Path ${path} does not exist'
|
||||
tag: 'resource-must-be-null'
|
||||
)
|
||||
}
|
||||
|
||||
responses := app.get_responses(entry, propfind_req) or {
|
||||
return ctx.server_error('Failed to get entry properties ${err}')
|
||||
}
|
||||
|
||||
// log.debug('[WebDAV] Propfind responses ${responses}')
|
||||
|
||||
// Create multistatus response using the responses
|
||||
ctx.res.set_status(.multi_status)
|
||||
return ctx.send_response_to_client('application/xml', responses.xml())
|
||||
}
|
||||
|
||||
@['/:path...'; put]
|
||||
fn (mut app App) create_or_update(mut ctx Context, path string) veb.Result {
|
||||
if app.vfs.exists(path) {
|
||||
if fs_entry := app.vfs.get(path) {
|
||||
fn (mut server Server) create_or_update(mut ctx Context, path string) veb.Result {
|
||||
if server.vfs.exists(path) {
|
||||
if fs_entry := server.vfs.get(path) {
|
||||
if fs_entry.is_dir() {
|
||||
console.print_stderr('Cannot PUT to a directory: ${path}')
|
||||
ctx.res.set_status(.method_not_allowed)
|
||||
@@ -274,12 +234,12 @@ fn (mut app App) create_or_update(mut ctx Context, path string) veb.Result {
|
||||
return ctx.server_error('failed to get FS Entry ${path}: ${err.msg()}')
|
||||
}
|
||||
} else {
|
||||
app.vfs.file_create(path) or { return ctx.server_error(err.msg()) }
|
||||
server.vfs.file_create(path) or { return ctx.server_error(err.msg()) }
|
||||
}
|
||||
if ctx.req.data.len > 0 {
|
||||
data := ctx.req.data.bytes()
|
||||
app.vfs.file_write(path, data) or { return ctx.server_error(err.msg()) }
|
||||
server.vfs.file_write(path, data) or { return ctx.server_error(err.msg()) }
|
||||
return ctx.ok('HTTP 200: Successfully wrote file: ${path}')
|
||||
}
|
||||
return ctx.ok('HTTP 200: Successfully created file: ${path}')
|
||||
}
|
||||
}
|
||||
102
lib/dav/webdav/server_propfind.v
Normal file
102
lib/dav/webdav/server_propfind.v
Normal file
@@ -0,0 +1,102 @@
|
||||
module webdav
|
||||
|
||||
import encoding.xml
|
||||
import log
|
||||
import freeflowuniverse.herolib.core.pathlib
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
import os
|
||||
import time
|
||||
import net.http
|
||||
import veb
|
||||
|
||||
@['/:path...'; propfind]
|
||||
fn (mut server Server) propfind(mut ctx Context, path string) veb.Result {
|
||||
// Parse PROPFIND request
|
||||
propfind_req := parse_propfind_xml(ctx.req) or {
|
||||
return ctx.error(WebDAVError{
|
||||
status: .bad_request
|
||||
message: 'Failed to parse PROPFIND XML: ${err}'
|
||||
tag: 'propfind-parse-error'
|
||||
})
|
||||
}
|
||||
|
||||
log.debug('[WebDAV] Propfind Request: ${propfind_req.typ} ${propfind_req.depth}')
|
||||
|
||||
// Check if resource is locked
|
||||
if server.lock_manager.is_locked(ctx.req.url) {
|
||||
// If the resource is locked, we should still return properties
|
||||
// but we might need to indicate the lock status in the response
|
||||
// This is handled in the property generation
|
||||
log.info('[WebDAV] Resource is locked: ${ctx.req.url}')
|
||||
}
|
||||
|
||||
entry := server.vfs.get(path) or {
|
||||
return ctx.error(
|
||||
status: .not_found
|
||||
message: 'Path ${path} does not exist'
|
||||
tag: 'resource-must-be-null'
|
||||
)
|
||||
}
|
||||
|
||||
responses := server.get_responses(entry, propfind_req, path) or {
|
||||
return ctx.server_error('Failed to get entry properties ${err}')
|
||||
}
|
||||
|
||||
// log.debug('[WebDAV] Propfind responses ${responses}')
|
||||
|
||||
// Create multistatus response using the responses
|
||||
ctx.res.set_status(.multi_status)
|
||||
return ctx.send_response_to_client('application/xml', responses.xml())
|
||||
}
|
||||
|
||||
// get_responses returns all properties for the given path and depth
|
||||
fn (mut server Server) get_responses(entry vfs.FSEntry, req PropfindRequest, path string) ![]Response {
|
||||
mut responses := []Response{}
|
||||
|
||||
// path := server.vfs.get_path(entry)!
|
||||
|
||||
// main entry response
|
||||
responses << Response {
|
||||
href: path
|
||||
// not_found: entry.get_unfound_properties(req)
|
||||
found_props: server.get_properties(entry)
|
||||
}
|
||||
|
||||
if !entry.is_dir() || req.depth == .zero {
|
||||
return responses
|
||||
}
|
||||
|
||||
entries := server.vfs.dir_list(path) or {
|
||||
log.error('Failed to list directory for ${path} ${err}')
|
||||
return responses }
|
||||
for e in entries {
|
||||
responses << server.get_responses(e, PropfindRequest {
|
||||
...req,
|
||||
depth: if req.depth == .one { .zero } else { .infinity }
|
||||
}, '${path.trim_string_right("/")}/${e.get_metadata().name}')!
|
||||
}
|
||||
return responses
|
||||
}
|
||||
|
||||
// returns the properties of a filesystem entry
|
||||
fn (mut server Server) get_properties(entry &vfs.FSEntry) []Property {
|
||||
mut props := []Property{}
|
||||
|
||||
metadata := entry.get_metadata()
|
||||
|
||||
// Display name
|
||||
props << DisplayName(metadata.name)
|
||||
props << GetLastModified(format_iso8601(metadata.modified_time()))
|
||||
props << GetContentType(if entry.is_dir() {'httpd/unix-directory'} else {get_file_content_type(entry.get_metadata().name)})
|
||||
props << ResourceType(entry.is_dir())
|
||||
|
||||
// Content length (only for files)
|
||||
if !entry.is_dir() {
|
||||
props << GetContentLength(metadata.size.str())
|
||||
}
|
||||
|
||||
// Creation date
|
||||
props << CreationDate(format_iso8601(metadata.created_time()))
|
||||
return props
|
||||
}
|
||||
@@ -1,214 +1,554 @@
|
||||
module webdav
|
||||
|
||||
import net.http
|
||||
import freeflowuniverse.herolib.core.pathlib
|
||||
import freeflowuniverse.herolib.vfs.vfs_db
|
||||
import freeflowuniverse.herolib.data.ourdb
|
||||
import encoding.xml
|
||||
import os
|
||||
import time
|
||||
import encoding.base64
|
||||
import rand
|
||||
import veb
|
||||
import net.http
|
||||
import log
|
||||
|
||||
fn test_run() {
|
||||
mut app := new_app(
|
||||
user_db: {
|
||||
'mario': '123'
|
||||
}
|
||||
)!
|
||||
spawn app.run()
|
||||
fn testsuite_begin() {
|
||||
log.set_level(.debug)
|
||||
}
|
||||
|
||||
// fn test_get() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
// time.sleep(1 * time.second)
|
||||
// file_name := 'newfile.txt'
|
||||
// mut p := pathlib.get_file(path: '${root_dir}/${file_name}', create: true)!
|
||||
// p.write('my new file')!
|
||||
const testdata_path := os.join_path(os.dir(@FILE), 'testdata')
|
||||
const database_path := os.join_path(testdata_path, 'database')
|
||||
|
||||
// mut req := http.new_request(.get, 'http://localhost:${app.server_port}/${file_name}',
|
||||
// '')
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// Helper function to create a test server and DatabaseVFS
|
||||
fn setup_test_server(function string) !(&vfs_db.DatabaseVFS, &Server) {
|
||||
if !os.exists(testdata_path) {
|
||||
os.mkdir_all(testdata_path) or { return error('Failed to create testdata directory: ${err}') }
|
||||
}
|
||||
if !os.exists(database_path) {
|
||||
os.mkdir_all(database_path) or { return error('Failed to create database directory: ${err}') }
|
||||
}
|
||||
|
||||
mut metadata_db := ourdb.new(path: os.join_path(database_path, '${function}/metadata'))!
|
||||
mut data_db := ourdb.new(path: os.join_path(database_path, '${function}/data'))!
|
||||
mut vfs := vfs_db.new(mut metadata_db, mut data_db)!
|
||||
|
||||
// Create a test server
|
||||
mut server := new_server(vfs: vfs, user_db: {
|
||||
'admin': '123'
|
||||
})!
|
||||
|
||||
return vfs, server
|
||||
}
|
||||
|
||||
// response := req.do()!
|
||||
// assert response.body == 'my new file'
|
||||
// }
|
||||
// Helper function to create a test file in the DatabaseVFS
|
||||
fn create_test_file(mut vfs vfs_db.DatabaseVFS, path string, content string) ! {
|
||||
vfs.file_write(path, content.bytes())!
|
||||
}
|
||||
|
||||
// fn test_put() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
// time.sleep(1 * time.second)
|
||||
// file_name := 'newfile_put.txt'
|
||||
// Helper function to create a test directory in the DatabaseVFS
|
||||
fn create_test_directory(mut vfs vfs_db.DatabaseVFS, path string) ! {
|
||||
vfs.dir_create(path)!
|
||||
}
|
||||
|
||||
// mut data := 'my new put file'
|
||||
// mut req := http.new_request(.put, 'http://localhost:${app.server_port}/${file_name}',
|
||||
// data)
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// mut response := req.do()!
|
||||
fn test_server_run() ! {
|
||||
_, mut server := setup_test_server(@FILE)!
|
||||
spawn server.run()
|
||||
time.sleep(100 * time.millisecond)
|
||||
}
|
||||
|
||||
// mut p := pathlib.get_file(path: '${root_dir}/${file_name}')!
|
||||
fn test_server_index() ! {
|
||||
_, mut server := setup_test_server(@FILE)!
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.head
|
||||
url: '/'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.index(mut ctx)
|
||||
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
assert ctx.res.header.get_custom('DAV')! == '1,2'
|
||||
assert ctx.res.header.get(.allow)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
|
||||
assert ctx.res.header.get_custom('MS-Author-Via')! == 'DAV'
|
||||
assert ctx.res.header.get(.access_control_allow_origin)! == '*'
|
||||
assert ctx.res.header.get(.access_control_allow_methods)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
|
||||
assert ctx.res.header.get(.access_control_allow_headers)! == 'Authorization, Content-Type'
|
||||
assert ctx.res.header.get(.content_length)! == '0'
|
||||
}
|
||||
|
||||
// assert p.exists()
|
||||
// assert p.read()! == data
|
||||
fn test_server_options() ! {
|
||||
_, mut server := setup_test_server(@FILE)!
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.options
|
||||
url: '/test_path'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.options(mut ctx, 'test_path')
|
||||
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
assert ctx.res.header.get_custom('DAV')! == '1,2'
|
||||
assert ctx.res.header.get(.allow)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
|
||||
assert ctx.res.header.get_custom('MS-Author-Via')! == 'DAV'
|
||||
assert ctx.res.header.get(.access_control_allow_origin)! == '*'
|
||||
assert ctx.res.header.get(.access_control_allow_methods)! == 'OPTIONS, PROPFIND, MKCOL, GET, HEAD, POST, PUT, DELETE, COPY, MOVE'
|
||||
assert ctx.res.header.get(.access_control_allow_headers)! == 'Authorization, Content-Type'
|
||||
assert ctx.res.header.get(.content_length)! == '0'
|
||||
}
|
||||
|
||||
// data = 'updated data'
|
||||
// req = http.new_request(.put, 'http://localhost:${app.server_port}/${file_name}', data)
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// response = req.do()!
|
||||
fn test_server_lock() ! {
|
||||
_, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create a test file to lock
|
||||
test_path := 'test_lock_file.txt'
|
||||
|
||||
// Prepare lock XML request body
|
||||
lock_xml := '<?xml version="1.0" encoding="utf-8"?>
|
||||
<D:lockinfo xmlns:D="DAV:">
|
||||
<D:lockscope><D:exclusive/></D:lockscope>
|
||||
<D:locktype><D:write/></D:locktype>
|
||||
<D:owner>
|
||||
<D:href>test-user</D:href>
|
||||
</D:owner>
|
||||
</D:lockinfo>'
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.lock
|
||||
url: '/${test_path}'
|
||||
data: lock_xml
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
// Set headers
|
||||
ctx.req.header.add_custom('Depth', '0')!
|
||||
ctx.req.header.add_custom('Timeout', 'Second-3600')!
|
||||
|
||||
server.lock(mut ctx, test_path)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
assert ctx.res.header.get_custom('Lock-Token')! != ''
|
||||
assert ctx.res.header.get(.content_type)! == 'application/xml'
|
||||
|
||||
// Verify response contains proper lock XML
|
||||
assert ctx.res.body.len > 0
|
||||
assert ctx.res.body.contains('<D:lockdiscovery')
|
||||
assert ctx.res.body.contains('<D:activelock>')
|
||||
}
|
||||
|
||||
// p = pathlib.get_file(path: '${root_dir}/${file_name}')!
|
||||
fn test_server_unlock() ! {
|
||||
_, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create a test file
|
||||
test_path := 'test_unlock_file.txt'
|
||||
|
||||
// First lock the resource
|
||||
lock_xml := '<?xml version="1.0" encoding="utf-8"?>
|
||||
<D:lockinfo xmlns:D="DAV:">
|
||||
<D:lockscope><D:exclusive/></D:lockscope>
|
||||
<D:locktype><D:write/></D:locktype>
|
||||
<D:owner>
|
||||
<D:href>test-user</D:href>
|
||||
</D:owner>
|
||||
</D:lockinfo>'
|
||||
|
||||
mut lock_ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.lock
|
||||
url: '/${test_path}'
|
||||
data: lock_xml
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
lock_ctx.req.header.add_custom('Depth', '0')!
|
||||
lock_ctx.req.header.add_custom('Timeout', 'Second-3600')!
|
||||
|
||||
server.lock(mut lock_ctx, test_path)
|
||||
|
||||
// Extract lock token from response
|
||||
lock_token := lock_ctx.res.header.get_custom('Lock-Token')!
|
||||
|
||||
// Now unlock the resource
|
||||
mut unlock_ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.unlock
|
||||
url: '/${test_path}'
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
unlock_ctx.req.header.add_custom('Lock-Token', lock_token)!
|
||||
|
||||
server.unlock(mut unlock_ctx, test_path)
|
||||
|
||||
// Check response
|
||||
assert unlock_ctx.res.status() == http.Status.no_content
|
||||
}
|
||||
|
||||
// assert p.exists()
|
||||
// assert p.read()! == data
|
||||
// }
|
||||
fn test_server_get_file() ! {
|
||||
mut vfs, mut server := setup_test_server(@FN)!
|
||||
|
||||
// Create a test file
|
||||
test_path := 'test_get_file.txt'
|
||||
test_content := 'This is a test file content'
|
||||
create_test_file(mut vfs, test_path, test_content)!
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.get
|
||||
url: '/${test_path}'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.get_file(mut ctx, test_path)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
assert ctx.res.header.get(.content_type)! == 'text/plain'
|
||||
assert ctx.res.body == test_content
|
||||
}
|
||||
|
||||
// fn test_copy() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
fn test_server_exists() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create a test file
|
||||
test_path := 'test_exists_file.txt'
|
||||
test_content := 'This is a test file content'
|
||||
create_test_file(mut vfs, test_path, test_content)!
|
||||
|
||||
// Test for existing file
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.head
|
||||
url: '/${test_path}'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.exists(mut ctx, test_path)
|
||||
|
||||
// Check response for existing file
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
assert ctx.res.header.get_custom('dav')! == '1, 2'
|
||||
assert ctx.res.header.get(.content_length)! == '0'
|
||||
assert ctx.res.header.get_custom('Allow')!.contains('OPTIONS')
|
||||
assert ctx.res.header.get(.accept_ranges)! == 'bytes'
|
||||
|
||||
// Test for non-existing file
|
||||
mut ctx2 := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.head
|
||||
url: '/nonexistent_file.txt'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.exists(mut ctx2, 'nonexistent_file.txt')
|
||||
|
||||
// Check response for non-existing file
|
||||
assert ctx2.res.status() == http.Status.not_found
|
||||
}
|
||||
|
||||
// time.sleep(1 * time.second)
|
||||
// file_name1, file_name2 := 'newfile_copy1.txt', 'newfile_copy2.txt'
|
||||
// mut p1 := pathlib.get_file(path: '${root_dir}/${file_name1}', create: true)!
|
||||
// data := 'file copy data'
|
||||
// p1.write(data)!
|
||||
fn test_server_delete() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create a test file
|
||||
test_path := 'test_delete_file.txt'
|
||||
test_content := 'This is a test file to delete'
|
||||
create_test_file(mut vfs, test_path, test_content)!
|
||||
|
||||
// Verify file exists
|
||||
assert vfs.exists(test_path)
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.delete
|
||||
url: '/${test_path}'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.delete(mut ctx, test_path)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.no_content
|
||||
|
||||
// Verify file was deleted
|
||||
assert !vfs.exists(test_path)
|
||||
}
|
||||
|
||||
// mut req := http.new_request(.copy, 'http://localhost:${app.server_port}/${file_name1}',
|
||||
// '')
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// req.add_custom_header('Destination', 'http://localhost:${app.server_port}/${file_name2}')!
|
||||
// mut response := req.do()!
|
||||
fn test_server_copy() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create a test file
|
||||
source_path := 'test_copy_source.txt'
|
||||
dest_path := 'test_copy_dest.txt'
|
||||
test_content := 'This is a test file to copy'
|
||||
create_test_file(mut vfs, source_path, test_content)!
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.copy
|
||||
url: '/${source_path}'
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
// Set Destination header
|
||||
ctx.req.header.add_custom('Destination', 'http://localhost/${dest_path}')!
|
||||
log.set_level(.debug)
|
||||
server.copy(mut ctx, source_path)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
|
||||
// Verify destination file exists and has the same content
|
||||
assert vfs.exists(dest_path)
|
||||
dest_content := vfs.file_read(dest_path) or { panic(err) }
|
||||
assert dest_content.bytestr() == test_content
|
||||
}
|
||||
|
||||
// assert p1.exists()
|
||||
// mut p2 := pathlib.get_file(path: '${root_dir}/${file_name2}')!
|
||||
// assert p2.exists()
|
||||
// assert p2.read()! == data
|
||||
// }
|
||||
fn test_server_move() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create a test file
|
||||
source_path := 'test_move_source.txt'
|
||||
dest_path := 'test_move_dest.txt'
|
||||
test_content := 'This is a test file to move'
|
||||
create_test_file(mut vfs, source_path, test_content)!
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.move
|
||||
url: '/${source_path}'
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
// Set Destination header
|
||||
ctx.req.header.add_custom('Destination', 'http://localhost/${dest_path}')!
|
||||
|
||||
server.move(mut ctx, source_path)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
|
||||
// Verify source file no longer exists
|
||||
assert !vfs.exists(source_path)
|
||||
|
||||
// Verify destination file exists and has the same content
|
||||
assert vfs.exists(dest_path)
|
||||
dest_content := vfs.file_read(dest_path) or { panic(err) }
|
||||
assert dest_content.bytestr() == test_content
|
||||
}
|
||||
|
||||
// fn test_move() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
fn test_server_mkcol() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Test directory path
|
||||
test_dir := 'test_mkcol_dir'
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.mkcol
|
||||
url: '/${test_dir}'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.mkcol(mut ctx, test_dir)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.created
|
||||
|
||||
// Verify directory was created
|
||||
assert vfs.exists(test_dir)
|
||||
dir_entry := vfs.get(test_dir) or { panic(err) }
|
||||
assert dir_entry.is_dir()
|
||||
|
||||
// Test creating a collection that already exists
|
||||
mut ctx2 := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.mkcol
|
||||
url: '/${test_dir}'
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.mkcol(mut ctx2, test_dir)
|
||||
|
||||
// Should return bad request for existing collection
|
||||
assert ctx2.res.status() == http.Status.bad_request
|
||||
}
|
||||
|
||||
// time.sleep(1 * time.second)
|
||||
// file_name1, file_name2 := 'newfile_move1.txt', 'newfile_move2.txt'
|
||||
// mut p := pathlib.get_file(path: '${root_dir}/${file_name1}', create: true)!
|
||||
// data := 'file move data'
|
||||
// p.write(data)!
|
||||
fn test_server_put() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Test file path
|
||||
test_file := 'test_put_file.txt'
|
||||
test_content := 'This is content for PUT test'
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.put
|
||||
url: '/${test_file}'
|
||||
data: test_content
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.create_or_update(mut ctx, test_file)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.ok
|
||||
|
||||
// Verify file was created with correct content
|
||||
assert vfs.exists(test_file)
|
||||
file_content := vfs.file_read(test_file) or { panic(err) }
|
||||
assert file_content.bytestr() == test_content
|
||||
|
||||
// Test updating existing file
|
||||
new_content := 'Updated content for PUT test'
|
||||
mut ctx2 := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.put
|
||||
url: '/${test_file}'
|
||||
data: new_content
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
server.create_or_update(mut ctx2, test_file)
|
||||
|
||||
// Check response
|
||||
assert ctx2.res.status() == http.Status.ok
|
||||
|
||||
// Verify file was updated with new content
|
||||
updated_content := vfs.file_read(test_file) or { panic(err) }
|
||||
assert updated_content.bytestr() == new_content
|
||||
}
|
||||
|
||||
// mut req := http.new_request(.move, 'http://localhost:${app.server_port}/${file_name1}',
|
||||
// '')
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// req.add_custom_header('Destination', 'http://localhost:${app.server_port}/${file_name2}')!
|
||||
// mut response := req.do()!
|
||||
|
||||
// p = pathlib.get_file(path: '${root_dir}/${file_name2}')!
|
||||
// assert p.exists()
|
||||
// assert p.read()! == data
|
||||
// }
|
||||
|
||||
// fn test_delete() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
|
||||
// time.sleep(1 * time.second)
|
||||
// file_name := 'newfile_delete.txt'
|
||||
// mut p := pathlib.get_file(path: '${root_dir}/${file_name}', create: true)!
|
||||
|
||||
// mut req := http.new_request(.delete, 'http://localhost:${app.server_port}/${file_name}',
|
||||
// '')
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// mut response := req.do()!
|
||||
|
||||
// assert !p.exists()
|
||||
// }
|
||||
|
||||
// fn test_mkcol() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
|
||||
// time.sleep(1 * time.second)
|
||||
// dir_name := 'newdir'
|
||||
|
||||
// mut req := http.new_request(.mkcol, 'http://localhost:${app.server_port}/${dir_name}',
|
||||
// '')
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// mut response := req.do()!
|
||||
|
||||
// mut p := pathlib.get_dir(path: '${root_dir}/${dir_name}')!
|
||||
// assert p.exists()
|
||||
// }
|
||||
|
||||
// fn test_propfind() {
|
||||
// root_dir := '/tmp/webdav'
|
||||
// mut app := new_app(
|
||||
// server_port: rand.int_in_range(8000, 9000)!
|
||||
// root_dir: root_dir
|
||||
// user_db: {
|
||||
// 'mario': '123'
|
||||
// }
|
||||
// )!
|
||||
// app.run(background: true)
|
||||
|
||||
// time.sleep(1 * time.second)
|
||||
// dir_name := 'newdir'
|
||||
// file1 := 'file1.txt'
|
||||
// file2 := 'file2.html'
|
||||
// dir1 := 'dir1'
|
||||
|
||||
// mut p := pathlib.get_dir(path: '${root_dir}/${dir_name}', create: true)!
|
||||
// mut file1_p := pathlib.get_file(path: '${p.path}/${file1}', create: true)!
|
||||
// mut file2_p := pathlib.get_file(path: '${p.path}/${file2}', create: true)!
|
||||
// mut dir1_p := pathlib.get_dir(path: '${p.path}/${dir1}', create: true)!
|
||||
|
||||
// mut req := http.new_request(.propfind, 'http://localhost:${app.server_port}/${dir_name}',
|
||||
// '')
|
||||
// signature := base64.encode_str('mario:123')
|
||||
// req.add_custom_header('Authorization', 'Basic ${signature}')!
|
||||
// mut response := req.do()!
|
||||
|
||||
// assert response.status_code == 207
|
||||
// }
|
||||
fn test_server_propfind() ! {
|
||||
mut vfs, mut server := setup_test_server(@FILE)!
|
||||
|
||||
// Create test directory and file structure
|
||||
root_dir := 'propfind_test'
|
||||
file_in_root := '${root_dir}/test_file.txt'
|
||||
subdir := '${root_dir}/subdir'
|
||||
file_in_subdir := '${subdir}/subdir_file.txt'
|
||||
|
||||
create_test_directory(mut vfs, root_dir)!
|
||||
create_test_file(mut vfs, file_in_root, 'Test file content')!
|
||||
create_test_directory(mut vfs, subdir)!
|
||||
create_test_file(mut vfs, file_in_subdir, 'Subdir file content')!
|
||||
|
||||
// Test PROPFIND with depth=0 (just the resource)
|
||||
propfind_xml := '<?xml version="1.0" encoding="utf-8"?>
|
||||
<D:propfind xmlns:D="DAV:">
|
||||
<D:allprop/>
|
||||
</D:propfind>'
|
||||
|
||||
mut ctx := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.propfind
|
||||
url: '/${root_dir}'
|
||||
data: propfind_xml
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
// Set Depth header to 0
|
||||
ctx.req.header.add_custom('Depth', '0')!
|
||||
|
||||
server.propfind(mut ctx, root_dir)
|
||||
|
||||
// Check response
|
||||
assert ctx.res.status() == http.Status.multi_status
|
||||
assert ctx.res.header.get(.content_type)! == 'application/xml'
|
||||
assert ctx.res.body.contains('<D:multistatus')
|
||||
assert ctx.res.body.contains('<D:response>')
|
||||
assert ctx.res.body.contains('<D:href>${root_dir}</D:href>')
|
||||
// Should only include the requested resource
|
||||
assert !ctx.res.body.contains('<D:href>${file_in_root}</D:href>')
|
||||
|
||||
// Test PROPFIND with depth=1 (resource and immediate children)
|
||||
mut ctx2 := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.propfind
|
||||
url: '/${root_dir}'
|
||||
data: propfind_xml
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
// Set Depth header to 1
|
||||
ctx2.req.header.add_custom('Depth', '1')!
|
||||
|
||||
server.propfind(mut ctx2, root_dir)
|
||||
|
||||
// Check response
|
||||
assert ctx2.res.status() == http.Status.multi_status
|
||||
assert ctx2.res.body.contains('<D:multistatus')
|
||||
// Should include the resource and immediate children
|
||||
assert ctx2.res.body.contains('<D:href>${root_dir}</D:href>')
|
||||
assert ctx2.res.body.contains('<D:href>${file_in_root}</D:href>')
|
||||
assert ctx2.res.body.contains('<D:href>${subdir}</D:href>')
|
||||
// But not grandchildren
|
||||
assert !ctx2.res.body.contains('<D:href>${file_in_subdir}</D:href>')
|
||||
|
||||
// Test PROPFIND with depth=infinity (all descendants)
|
||||
mut ctx3 := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.propfind
|
||||
url: '/${root_dir}'
|
||||
data: propfind_xml
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
// Set Depth header to infinity
|
||||
ctx3.req.header.add_custom('Depth', 'infinity')!
|
||||
|
||||
server.propfind(mut ctx3, root_dir)
|
||||
|
||||
// Check response
|
||||
assert ctx3.res.status() == http.Status.multi_status
|
||||
// Should include all descendants
|
||||
assert ctx3.res.body.contains('<D:href>${root_dir}</D:href>')
|
||||
assert ctx3.res.body.contains('<D:href>${file_in_root}</D:href>')
|
||||
assert ctx3.res.body.contains('<D:href>${subdir}</D:href>')
|
||||
assert ctx3.res.body.contains('<D:href>${file_in_subdir}</D:href>')
|
||||
|
||||
// Test PROPFIND for non-existent resource
|
||||
mut ctx4 := Context{
|
||||
req: http.Request{
|
||||
method: http.Method.propfind
|
||||
url: '/nonexistent'
|
||||
data: propfind_xml
|
||||
header: http.Header{}
|
||||
}
|
||||
res: http.Response{}
|
||||
}
|
||||
|
||||
ctx4.req.header.add_custom('Depth', '0')!
|
||||
|
||||
server.propfind(mut ctx4, 'nonexistent')
|
||||
|
||||
// Should return not found
|
||||
assert ctx4.res.status() == http.Status.not_found
|
||||
}
|
||||
|
||||
@@ -32,6 +32,9 @@ mut:
|
||||
move(src_path string, dst_path string) !FSEntry
|
||||
delete(path string) !
|
||||
|
||||
// FSEntry Operations
|
||||
get_path(entry &FSEntry) !string
|
||||
|
||||
// Cleanup operation
|
||||
destroy() !
|
||||
}
|
||||
@@ -39,7 +42,7 @@ mut:
|
||||
// FSEntry represents a filesystem entry (file, directory, or symlink)
|
||||
pub interface FSEntry {
|
||||
get_metadata() Metadata
|
||||
get_path() string
|
||||
// get_path() string
|
||||
is_dir() bool
|
||||
is_file() bool
|
||||
is_symlink() bool
|
||||
|
||||
@@ -7,7 +7,6 @@ pub struct Metadata {
|
||||
pub mut:
|
||||
id u32 @[required] // unique identifier used as key in DB
|
||||
name string @[required] // name of file or directory
|
||||
path string @[required] // path of file or directory
|
||||
file_type FileType
|
||||
size u64
|
||||
created_at i64 // unix epoch timestamp
|
||||
|
||||
@@ -35,26 +35,30 @@ pub fn (mut fs DatabaseVFS) get_next_id() u32 {
|
||||
// load_entry loads an entry from the database by ID and sets up parent references
|
||||
// loads without data
|
||||
fn (mut fs DatabaseVFS) load_entry(vfs_id u32) !FSEntry {
|
||||
if metadata := fs.db_metadata.get(fs.get_database_id(vfs_id)!) {
|
||||
match decode_entry_type(metadata)! {
|
||||
.directory {
|
||||
mut dir := decode_directory(metadata) or {
|
||||
return error('Failed to decode directory: ${err}')
|
||||
if db_id := fs.id_table[vfs_id] {
|
||||
if metadata := fs.db_metadata.get(db_id) {
|
||||
match decode_entry_type(metadata)! {
|
||||
.directory {
|
||||
mut dir := decode_directory(metadata) or {
|
||||
return error('Failed to decode directory: ${err}')
|
||||
}
|
||||
return dir
|
||||
}
|
||||
return dir
|
||||
}
|
||||
.file {
|
||||
return decode_file_metadata(metadata) or { return error('Failed to decode file: ${err}') }
|
||||
}
|
||||
.symlink {
|
||||
mut symlink := decode_symlink(metadata) or {
|
||||
return error('Failed to decode symlink: ${err}')
|
||||
.file {
|
||||
return decode_file_metadata(metadata) or { return error('Failed to decode file: ${err}') }
|
||||
}
|
||||
.symlink {
|
||||
mut symlink := decode_symlink(metadata) or {
|
||||
return error('Failed to decode symlink: ${err}')
|
||||
}
|
||||
return symlink
|
||||
}
|
||||
return symlink
|
||||
}
|
||||
} else {
|
||||
return error('Entry ${vfs_id} not found ${err}')
|
||||
}
|
||||
} else {
|
||||
return error('Entry ${vfs_id} not found ${err}')
|
||||
return error('Entry ${vfs_id} not found')
|
||||
}
|
||||
}
|
||||
|
||||
@@ -74,4 +78,102 @@ fn (mut fs DatabaseVFS) load_entry(vfs_id u32) !FSEntry {
|
||||
// }
|
||||
// }
|
||||
// return file_data
|
||||
// }
|
||||
// }
|
||||
|
||||
|
||||
fn (mut self DatabaseVFS) get_entry(path string) !FSEntry {
|
||||
if path == '/' || path == '' || path == '.' {
|
||||
return FSEntry(self.root_get_as_dir()!)
|
||||
}
|
||||
parts := path.trim_string_left('/').split('/')
|
||||
mut parent_dir := *self.root_get_as_dir()!
|
||||
for i, part in parts {
|
||||
entry := self.directory_get_entry(parent_dir, part) or {
|
||||
return error('Failed to get entry ${err}')
|
||||
}
|
||||
if i == parts.len - 1 {
|
||||
// last part, means entry is found
|
||||
return entry
|
||||
}
|
||||
if entry is Directory {
|
||||
parent_dir = entry
|
||||
} else {
|
||||
return error('Failed to get entry, expected dir')
|
||||
}
|
||||
}
|
||||
// mut current := *self.root_get_as_dir()!
|
||||
// return self.directory_get_entry(mut current, path) or {
|
||||
return error('Path not found: ${path}')
|
||||
// }
|
||||
}
|
||||
|
||||
// internal function to get an entry of some name from a directory
|
||||
fn (mut self DatabaseVFS) directory_get_entry(dir Directory, name string) ?FSEntry {
|
||||
// mut children := self.directory_children(mut dir, false) or {
|
||||
// panic('this should never happen')
|
||||
// }
|
||||
for child_id in dir.children {
|
||||
if entry := self.load_entry(child_id) {
|
||||
if entry.metadata.name == name {
|
||||
return entry
|
||||
}
|
||||
} else {
|
||||
panic('Filesystem is corrupted, this should never happen ${err}')
|
||||
}
|
||||
}
|
||||
return none
|
||||
}
|
||||
|
||||
fn (mut self DatabaseVFS) get_directory(path string) !&Directory {
|
||||
mut entry := self.get_entry(path)!
|
||||
if mut entry is Directory {
|
||||
return &entry
|
||||
}
|
||||
return error('Not a directory: ${path}')
|
||||
}
|
||||
|
||||
|
||||
pub fn (mut self DatabaseVFS) get_path(entry_ &vfs.FSEntry) !string {
|
||||
// entry := self.load_entry(entry_.metadata.)
|
||||
// entry.parent_id == 0 {
|
||||
// return '/${entry.metadata.name}'
|
||||
// } else {
|
||||
// parent := self.load_entry(entry.parent_id)!
|
||||
// return '${self.get_path(parent)!}/${entry.metadata.name}'
|
||||
// }
|
||||
return ''
|
||||
}
|
||||
|
||||
|
||||
// Implementation of VFSImplementation interface
|
||||
pub fn (mut fs DatabaseVFS) root_get_as_dir() !&Directory {
|
||||
// Try to load root directory from DB if it exists
|
||||
|
||||
if db_id := fs.id_table[fs.root_id] {
|
||||
if data := fs.db_metadata.get(db_id) {
|
||||
mut loaded_root := decode_directory(data) or {
|
||||
panic('Failed to decode root directory: ${err}')
|
||||
}
|
||||
return &loaded_root
|
||||
}
|
||||
}
|
||||
|
||||
// Create and save new root directory
|
||||
mut myroot := Directory{
|
||||
metadata: vfs.Metadata{
|
||||
id: fs.get_next_id()
|
||||
file_type: .directory
|
||||
name: ''
|
||||
created_at: time.now().unix()
|
||||
modified_at: time.now().unix()
|
||||
accessed_at: time.now().unix()
|
||||
mode: 0o755 // default directory permissions
|
||||
owner: 'user' // TODO: get from system
|
||||
group: 'user' // TODO: get from system
|
||||
}
|
||||
parent_id: 0
|
||||
}
|
||||
fs.save_entry(myroot) or {return error('failed to set root ${err}')}
|
||||
fs.root_id = myroot.metadata.id
|
||||
return &myroot
|
||||
}
|
||||
@@ -12,12 +12,10 @@ fn setup_vfs() !(&DatabaseVFS, string) {
|
||||
// Create separate databases for data and metadata
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
// Create VFS with separate databases for data and metadata
|
||||
@@ -8,39 +8,42 @@ import time
|
||||
import log
|
||||
|
||||
// save_entry saves an entry to the database
|
||||
pub fn (mut fs DatabaseVFS) save_entry(entry FSEntry) !u32 {
|
||||
pub fn (mut fs DatabaseVFS) save_entry(entry FSEntry) ! {
|
||||
match entry {
|
||||
Directory {
|
||||
encoded := entry.encode()
|
||||
db_id := fs.db_metadata.set(id: entry.metadata.id, data: encoded) or {
|
||||
db_id := fs.db_metadata.set(data: encoded) or {
|
||||
return error('Failed to save directory on id:${entry.metadata.id}: ${err}')
|
||||
}
|
||||
for child_id in entry.children {
|
||||
_ := fs.db_metadata.get(fs.get_database_id(child_id)!) or {
|
||||
return error('Failed to get entry for directory child ${child_id} missing.\n${err}')
|
||||
}
|
||||
}
|
||||
log.debug('[DatabaseVFS] Saving dir entry with children ${entry.children}')
|
||||
fs.set_database_id(entry.metadata.id, db_id)!
|
||||
return entry.metadata.id
|
||||
fs.id_table[entry.metadata.id] = db_id
|
||||
// for child_id in entry.children {
|
||||
// if db_id := fs.id_table[child_id] {
|
||||
// _ := fs.db_metadata.get(fs.get_database_id(child_id)!) or {
|
||||
// return error('Failed to get entry for directory child ${child_id} missing.\n${err}')
|
||||
// }
|
||||
// log.debug('[DatabaseVFS] Saving dir entry with children ${entry.children}')
|
||||
// fs.set_database_id(entry.metadata.id, db_id)!
|
||||
// return entry.metadata.id
|
||||
// } else {
|
||||
// return error('Failed to get entry for directory child ${child_id} missing.\n${err}')
|
||||
// }
|
||||
// }
|
||||
}
|
||||
File {
|
||||
metadata_bytes := entry.encode()
|
||||
// Save the metadata_bytes to metadata_db
|
||||
metadata_db_id := fs.db_metadata.set(id: entry.metadata.id, data: metadata_bytes) or {
|
||||
metadata_db_id := fs.db_metadata.set(data: metadata_bytes) or {
|
||||
return error('Failed to save file metadata on id:${entry.metadata.id}: ${err}')
|
||||
}
|
||||
|
||||
fs.set_database_id(entry.metadata.id, metadata_db_id)!
|
||||
return entry.metadata.id
|
||||
fs.id_table[entry.metadata.id] = metadata_db_id
|
||||
}
|
||||
Symlink {
|
||||
encoded := entry.encode()
|
||||
db_id := fs.db_metadata.set(id: entry.metadata.id, data: encoded) or {
|
||||
db_id := fs.db_metadata.set(data: encoded) or {
|
||||
return error('Failed to save symlink on id:${entry.metadata.id}: ${err}')
|
||||
}
|
||||
fs.set_database_id(entry.metadata.id, db_id)!
|
||||
return entry.metadata.id
|
||||
fs.id_table[entry.metadata.id] = db_id
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -64,15 +67,15 @@ pub fn (mut fs DatabaseVFS) save_file(file_ File, data []u8) !u32 {
|
||||
if data.len > 0 {
|
||||
// file has data so that will be stored in data_db
|
||||
// split data_encoded into chunks of 64 kb
|
||||
chunks := arrays.chunk(data, 64 * 1024)
|
||||
chunks := arrays.chunk(data, (64 * 1024) - 1)
|
||||
mut chunk_ids := []u32{}
|
||||
|
||||
for i, chunk in chunks {
|
||||
// Generate a unique ID for each chunk based on the file ID
|
||||
chunk_id := file_id * 1000 + u32(i) + 1
|
||||
chunk_ids << fs.db_data.set(id: chunk_id, data: chunk) or {
|
||||
chunk_ids << fs.db_data.set(data: chunk) or {
|
||||
return error('Failed to save file data on id:${file.metadata.id}: ${err}')
|
||||
}
|
||||
log.debug('[DatabaseVFS] Saving chunk ${chunk_ids}')
|
||||
}
|
||||
|
||||
// Update the file with chunk IDs and size
|
||||
@@ -89,10 +92,10 @@ pub fn (mut fs DatabaseVFS) save_file(file_ File, data []u8) !u32 {
|
||||
// Encode the file with all its metadata
|
||||
metadata_bytes := updated_file.encode()
|
||||
// Save the metadata_bytes to metadata_db
|
||||
metadata_db_id := fs.db_metadata.set(id: file.metadata.id, data: metadata_bytes) or {
|
||||
metadata_db_id := fs.db_metadata.set(data: metadata_bytes) or {
|
||||
return error('Failed to save file metadata on id:${file.metadata.id}: ${err}')
|
||||
}
|
||||
|
||||
fs.set_database_id(file.metadata.id, metadata_db_id)!
|
||||
fs.id_table[file.metadata.id] = metadata_db_id
|
||||
return file.metadata.id
|
||||
}
|
||||
|
||||
@@ -120,7 +120,6 @@ pub fn decode_symlink(data []u8) !Symlink {
|
||||
fn decode_metadata(mut d encoder.Decoder) !vfs.Metadata {
|
||||
id := d.get_u32()!
|
||||
name := d.get_string()!
|
||||
path := d.get_string()!
|
||||
file_type_byte := d.get_u8()!
|
||||
size := d.get_u64()!
|
||||
created_at := d.get_i64()!
|
||||
@@ -133,7 +132,6 @@ fn decode_metadata(mut d encoder.Decoder) !vfs.Metadata {
|
||||
return vfs.Metadata{
|
||||
id: id
|
||||
name: name
|
||||
path: path
|
||||
file_type: unsafe { vfs.FileType(file_type_byte) }
|
||||
size: size
|
||||
created_at: created_at
|
||||
|
||||
@@ -7,7 +7,6 @@ import freeflowuniverse.herolib.vfs
|
||||
fn encode_metadata(mut e encoder.Encoder, m vfs.Metadata) {
|
||||
e.add_u32(m.id)
|
||||
e.add_string(m.name)
|
||||
e.add_string(m.path)
|
||||
e.add_u8(u8(m.file_type)) // FileType enum as u8
|
||||
e.add_u64(m.size)
|
||||
e.add_i64(m.created_at)
|
||||
|
||||
@@ -11,7 +11,6 @@ fn test_directory_encoder_decoder() ! {
|
||||
dir := Directory{
|
||||
metadata: vfs.Metadata{
|
||||
id: u32(current_time)
|
||||
path: '/root'
|
||||
name: 'root'
|
||||
file_type: .directory
|
||||
created_at: current_time
|
||||
@@ -54,7 +53,6 @@ fn test_file_encoder_decoder() ! {
|
||||
metadata: vfs.Metadata{
|
||||
id: u32(current_time)
|
||||
name: 'test.txt'
|
||||
path: '/test.txt'
|
||||
file_type: .file
|
||||
size: 13 // Size of 'Hello, world!'
|
||||
created_at: current_time
|
||||
@@ -96,7 +94,6 @@ fn test_symlink_encoder_decoder() ! {
|
||||
metadata: vfs.Metadata{
|
||||
id: u32(current_time)
|
||||
name: 'test.txt'
|
||||
path: '/test.txt'
|
||||
file_type: .symlink
|
||||
created_at: current_time
|
||||
modified_at: current_time
|
||||
|
||||
@@ -1,19 +0,0 @@
|
||||
module vfs_db
|
||||
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import freeflowuniverse.herolib.data.ourdb
|
||||
import time
|
||||
|
||||
// get_database_id get's the corresponding db id for a file's metadata id.
|
||||
// since multiple vfs can use single db, or db's can have their own id logic
|
||||
// databases set independent id's to data
|
||||
pub fn (fs DatabaseVFS) get_database_id(vfs_id u32) !u32 {
|
||||
return fs.id_table[vfs_id] or { error('VFS ID ${vfs_id} not found.') }
|
||||
}
|
||||
|
||||
// get_database_id get's the corresponding db id for a file's metadata id.
|
||||
// since multiple vfs can use single db, or db's can have their own id logic
|
||||
// databases set independent id's to data
|
||||
pub fn (mut fs DatabaseVFS) set_database_id(vfs_id u32, db_id u32) ! {
|
||||
fs.id_table[vfs_id] = db_id
|
||||
}
|
||||
@@ -1,77 +0,0 @@
|
||||
module vfs_db
|
||||
|
||||
import os
|
||||
import freeflowuniverse.herolib.data.ourdb
|
||||
import rand
|
||||
|
||||
fn setup_vfs() !&DatabaseVFS {
|
||||
test_data_dir := os.join_path(os.temp_dir(), 'vfsourdb_id_table_test_${rand.string(3)}')
|
||||
os.mkdir_all(test_data_dir)!
|
||||
|
||||
// Create separate databases for data and metadata
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
// Create VFS with separate databases for data and metadata
|
||||
mut vfs := new(mut db_data, mut db_metadata)!
|
||||
return vfs
|
||||
}
|
||||
|
||||
fn test_set_get_database_id() ! {
|
||||
mut vfs := setup_vfs()!
|
||||
|
||||
// Test setting and getting database IDs
|
||||
vfs_id := u32(1)
|
||||
db_id := u32(42)
|
||||
|
||||
// Set the database ID
|
||||
vfs.set_database_id(vfs_id, db_id)!
|
||||
|
||||
// Get the database ID and verify it matches
|
||||
retrieved_id := vfs.get_database_id(vfs_id)!
|
||||
assert retrieved_id == db_id
|
||||
}
|
||||
|
||||
fn test_get_nonexistent_id() ! {
|
||||
mut vfs := setup_vfs()!
|
||||
|
||||
// Try to get a database ID that doesn't exist
|
||||
if _ := vfs.get_database_id(999) {
|
||||
assert false, 'Expected error when getting non-existent ID'
|
||||
} else {
|
||||
assert err.msg() == 'VFS ID 999 not found.'
|
||||
}
|
||||
}
|
||||
|
||||
fn test_multiple_ids() ! {
|
||||
mut vfs := setup_vfs()!
|
||||
|
||||
// Set multiple IDs
|
||||
vfs.set_database_id(1, 101)!
|
||||
vfs.set_database_id(2, 102)!
|
||||
vfs.set_database_id(3, 103)!
|
||||
|
||||
// Verify all IDs can be retrieved correctly
|
||||
assert vfs.get_database_id(1)! == 101
|
||||
assert vfs.get_database_id(2)! == 102
|
||||
assert vfs.get_database_id(3)! == 103
|
||||
}
|
||||
|
||||
fn test_update_id() ! {
|
||||
mut vfs := setup_vfs()!
|
||||
|
||||
// Set an ID
|
||||
vfs.set_database_id(1, 100)!
|
||||
assert vfs.get_database_id(1)! == 100
|
||||
|
||||
// Update the ID
|
||||
vfs.set_database_id(1, 200)!
|
||||
assert vfs.get_database_id(1)! == 200
|
||||
}
|
||||
@@ -1,29 +0,0 @@
|
||||
module vfs_db
|
||||
|
||||
import time
|
||||
import freeflowuniverse.herolib.vfs
|
||||
|
||||
// Metadata represents the common metadata for both files and directories
|
||||
pub struct NewMetadata {
|
||||
pub mut:
|
||||
name string @[required] // name of file or directory
|
||||
path string @[required] // name of file or directory
|
||||
file_type vfs.FileType @[required]
|
||||
size u64 @[required]
|
||||
mode u32 = 0o644 // file permissions
|
||||
owner string = 'user'
|
||||
group string = 'user'
|
||||
}
|
||||
|
||||
pub fn (mut fs DatabaseVFS) new_metadata(metadata NewMetadata) vfs.Metadata {
|
||||
return vfs.new_metadata(
|
||||
id: fs.get_next_id()
|
||||
name: metadata.name
|
||||
path: metadata.path
|
||||
file_type: metadata.file_type
|
||||
size: metadata.size
|
||||
mode: metadata.mode
|
||||
owner: metadata.owner
|
||||
group: metadata.group
|
||||
)
|
||||
}
|
||||
@@ -1,142 +0,0 @@
|
||||
module vfs_db
|
||||
|
||||
import os
|
||||
import freeflowuniverse.herolib.data.ourdb
|
||||
import freeflowuniverse.herolib.vfs as vfs_mod
|
||||
import rand
|
||||
|
||||
fn setup_vfs() !&DatabaseVFS {
|
||||
test_data_dir := os.join_path(os.temp_dir(), 'vfsourdb_metadata_test_${rand.string(3)}')
|
||||
os.mkdir_all(test_data_dir)!
|
||||
|
||||
// Create separate databases for data and metadata
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
// Create VFS with separate databases for data and metadata
|
||||
mut fs := new(mut db_data, mut db_metadata)!
|
||||
return fs
|
||||
}
|
||||
|
||||
fn test_new_metadata_file() ! {
|
||||
mut fs := setup_vfs()!
|
||||
|
||||
// Test creating file metadata
|
||||
metadata := fs.new_metadata(
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 1024
|
||||
)
|
||||
|
||||
// Verify the metadata
|
||||
assert metadata.name == 'test_file.txt'
|
||||
assert metadata.file_type == .file
|
||||
assert metadata.size == 1024
|
||||
assert metadata.mode == 0o644 // Default mode
|
||||
assert metadata.owner == 'user' // Default owner
|
||||
assert metadata.group == 'user' // Default group
|
||||
assert metadata.id == 1 // First ID
|
||||
}
|
||||
|
||||
fn test_new_metadata_directory() ! {
|
||||
mut fs := setup_vfs()!
|
||||
|
||||
// Test creating directory metadata
|
||||
metadata := fs.new_metadata(
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
)
|
||||
|
||||
// Verify the metadata
|
||||
assert metadata.name == 'test_dir'
|
||||
assert metadata.file_type == .directory
|
||||
assert metadata.size == 0
|
||||
assert metadata.mode == 0o644 // Default mode
|
||||
assert metadata.owner == 'user' // Default owner
|
||||
assert metadata.group == 'user' // Default group
|
||||
assert metadata.id == 1 // First ID
|
||||
}
|
||||
|
||||
fn test_new_metadata_symlink() ! {
|
||||
mut fs := setup_vfs()!
|
||||
|
||||
// Test creating symlink metadata
|
||||
metadata := fs.new_metadata(
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
)
|
||||
|
||||
// Verify the metadata
|
||||
assert metadata.name == 'test_link'
|
||||
assert metadata.file_type == .symlink
|
||||
assert metadata.size == 0
|
||||
assert metadata.mode == 0o644 // Default mode
|
||||
assert metadata.owner == 'user' // Default owner
|
||||
assert metadata.group == 'user' // Default group
|
||||
assert metadata.id == 1 // First ID
|
||||
}
|
||||
|
||||
fn test_new_metadata_custom_permissions() ! {
|
||||
mut fs := setup_vfs()!
|
||||
|
||||
// Test creating metadata with custom permissions
|
||||
metadata := fs.new_metadata(
|
||||
name: 'custom_file.txt'
|
||||
path: '/custom_file.txt'
|
||||
file_type: .file
|
||||
size: 2048
|
||||
mode: 0o755
|
||||
owner: 'admin'
|
||||
group: 'staff'
|
||||
)
|
||||
|
||||
// Verify the metadata
|
||||
assert metadata.name == 'custom_file.txt'
|
||||
assert metadata.file_type == .file
|
||||
assert metadata.size == 2048
|
||||
assert metadata.mode == 0o755
|
||||
assert metadata.owner == 'admin'
|
||||
assert metadata.group == 'staff'
|
||||
assert metadata.id == 1 // First ID
|
||||
}
|
||||
|
||||
fn test_new_metadata_sequential_ids() ! {
|
||||
mut fs := setup_vfs()!
|
||||
|
||||
// Create multiple metadata objects and verify IDs are sequential
|
||||
metadata1 := fs.new_metadata(
|
||||
name: 'file1.txt'
|
||||
path: '/file1.txt'
|
||||
file_type: .file
|
||||
size: 100
|
||||
)
|
||||
assert metadata1.id == 1
|
||||
|
||||
metadata2 := fs.new_metadata(
|
||||
name: 'file2.txt'
|
||||
path: '/file2.txt'
|
||||
file_type: .file
|
||||
size: 200
|
||||
)
|
||||
assert metadata2.id == 2
|
||||
|
||||
metadata3 := fs.new_metadata(
|
||||
name: 'file3.txt'
|
||||
path: '/file3.txt'
|
||||
file_type: .file
|
||||
size: 300
|
||||
)
|
||||
assert metadata3.id == 3
|
||||
}
|
||||
@@ -14,10 +14,6 @@ fn (d &Directory) get_metadata() vfs.Metadata {
|
||||
return d.metadata
|
||||
}
|
||||
|
||||
fn (d &Directory) get_path() string {
|
||||
return d.metadata.path
|
||||
}
|
||||
|
||||
// is_dir returns true if the entry is a directory
|
||||
pub fn (d &Directory) is_dir() bool {
|
||||
return d.metadata.file_type == .directory
|
||||
|
||||
@@ -7,7 +7,6 @@ fn test_directory_get_metadata() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -35,39 +34,11 @@ fn test_directory_get_metadata() {
|
||||
assert retrieved_metadata.group == 'user'
|
||||
}
|
||||
|
||||
fn test_directory_get_path() {
|
||||
// Create a directory with metadata
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
owner: 'user'
|
||||
group: 'user'
|
||||
created_at: 0
|
||||
modified_at: 0
|
||||
accessed_at: 0
|
||||
}
|
||||
|
||||
dir := Directory{
|
||||
metadata: metadata
|
||||
children: []
|
||||
parent_id: 0
|
||||
}
|
||||
|
||||
// Test get_path
|
||||
path := dir.get_path()
|
||||
assert path == '/test_dir'
|
||||
}
|
||||
|
||||
fn test_directory_is_dir() {
|
||||
// Create a directory with metadata
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -95,7 +66,6 @@ fn test_directory_with_children() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -124,7 +94,6 @@ fn test_directory_with_parent() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 2
|
||||
name: 'child_dir'
|
||||
path: '/parent_dir/child_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
|
||||
@@ -19,10 +19,6 @@ fn (f &File) get_metadata() vfs.Metadata {
|
||||
return f.metadata
|
||||
}
|
||||
|
||||
fn (f &File) get_path() string {
|
||||
return f.metadata.path
|
||||
}
|
||||
|
||||
// is_dir returns true if the entry is a directory
|
||||
pub fn (f &File) is_dir() bool {
|
||||
return f.metadata.file_type == .directory
|
||||
|
||||
@@ -30,7 +30,6 @@ fn test_file_get_metadata() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -58,39 +57,11 @@ fn test_file_get_metadata() {
|
||||
assert retrieved_metadata.group == 'user'
|
||||
}
|
||||
|
||||
fn test_file_get_path() {
|
||||
// Create a file with metadata
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
owner: 'user'
|
||||
group: 'user'
|
||||
created_at: 0
|
||||
modified_at: 0
|
||||
accessed_at: 0
|
||||
}
|
||||
|
||||
file := File{
|
||||
metadata: metadata
|
||||
parent_id: 0
|
||||
chunk_ids: []
|
||||
}
|
||||
|
||||
// Test get_path
|
||||
path := file.get_path()
|
||||
assert path == '/test_file.txt'
|
||||
}
|
||||
|
||||
fn test_file_is_file() {
|
||||
// Create a file with metadata
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -118,7 +89,6 @@ fn test_file_write_read() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -153,7 +123,6 @@ fn test_file_rename() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -180,7 +149,6 @@ fn test_new_file() ! {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -202,7 +170,6 @@ fn test_new_file() ! {
|
||||
assert file.metadata.name == 'test_file.txt'
|
||||
assert file.metadata.file_type == .file
|
||||
assert file.metadata.size == 13
|
||||
assert file.get_path() == '/test_file.txt'
|
||||
}
|
||||
|
||||
fn test_copy_file() ! {
|
||||
@@ -210,7 +177,6 @@ fn test_copy_file() ! {
|
||||
original_metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'original.txt'
|
||||
path: '/original.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o755
|
||||
@@ -231,7 +197,6 @@ fn test_copy_file() ! {
|
||||
copied_metadata := vfs_mod.Metadata{
|
||||
id: 2 // Different ID
|
||||
name: 'copied.txt'
|
||||
path: '/copied.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o755
|
||||
|
||||
@@ -9,10 +9,6 @@ fn (e &FSEntry) get_metadata() vfs.Metadata {
|
||||
return e.metadata
|
||||
}
|
||||
|
||||
fn (e &FSEntry) get_path() string {
|
||||
return e.metadata.path
|
||||
}
|
||||
|
||||
fn (e &FSEntry) is_dir() bool {
|
||||
return e.metadata.file_type == .directory
|
||||
}
|
||||
|
||||
@@ -8,7 +8,6 @@ fn test_fsentry_directory() {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -29,7 +28,6 @@ fn test_fsentry_directory() {
|
||||
assert entry.get_metadata().id == 1
|
||||
assert entry.get_metadata().name == 'test_dir'
|
||||
assert entry.get_metadata().file_type == .directory
|
||||
assert entry.get_path() == '/test_dir'
|
||||
assert entry.is_dir() == true
|
||||
assert entry.is_file() == false
|
||||
assert entry.is_symlink() == false
|
||||
@@ -41,7 +39,6 @@ fn test_fsentry_file() {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 2
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -62,7 +59,6 @@ fn test_fsentry_file() {
|
||||
assert entry.get_metadata().id == 2
|
||||
assert entry.get_metadata().name == 'test_file.txt'
|
||||
assert entry.get_metadata().file_type == .file
|
||||
assert entry.get_path() == '/test_file.txt'
|
||||
assert entry.is_dir() == false
|
||||
assert entry.is_file() == true
|
||||
assert entry.is_symlink() == false
|
||||
@@ -74,7 +70,6 @@ fn test_fsentry_symlink() {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 3
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -95,7 +90,6 @@ fn test_fsentry_symlink() {
|
||||
assert entry.get_metadata().id == 3
|
||||
assert entry.get_metadata().name == 'test_link'
|
||||
assert entry.get_metadata().file_type == .symlink
|
||||
assert entry.get_path() == '/test_link'
|
||||
assert entry.is_dir() == false
|
||||
assert entry.is_file() == false
|
||||
assert entry.is_symlink() == true
|
||||
@@ -107,7 +101,6 @@ fn test_fsentry_match() {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -125,7 +118,6 @@ fn test_fsentry_match() {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 2
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -143,7 +135,6 @@ fn test_fsentry_match() {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 3
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
|
||||
@@ -26,10 +26,6 @@ fn (s &Symlink) get_metadata() vfs.Metadata {
|
||||
return s.metadata
|
||||
}
|
||||
|
||||
fn (s &Symlink) get_path() string {
|
||||
return s.metadata.path
|
||||
}
|
||||
|
||||
// is_dir returns true if the entry is a directory
|
||||
pub fn (self &Symlink) is_dir() bool {
|
||||
return self.metadata.file_type == .directory
|
||||
|
||||
@@ -7,7 +7,6 @@ fn test_symlink_get_metadata() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -35,39 +34,11 @@ fn test_symlink_get_metadata() {
|
||||
assert retrieved_metadata.group == 'user'
|
||||
}
|
||||
|
||||
fn test_symlink_get_path() {
|
||||
// Create a symlink with metadata
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
owner: 'user'
|
||||
group: 'user'
|
||||
created_at: 0
|
||||
modified_at: 0
|
||||
accessed_at: 0
|
||||
}
|
||||
|
||||
symlink := Symlink{
|
||||
metadata: metadata
|
||||
target: '/path/to/target'
|
||||
parent_id: 0
|
||||
}
|
||||
|
||||
// Test get_path
|
||||
path := symlink.get_path()
|
||||
assert path == '/test_link'
|
||||
}
|
||||
|
||||
fn test_symlink_is_symlink() {
|
||||
// Create a symlink with metadata
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -95,7 +66,6 @@ fn test_symlink_update_target() ! {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -122,7 +92,6 @@ fn test_symlink_get_target() ! {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -149,7 +118,6 @@ fn test_symlink_with_parent() {
|
||||
metadata := vfs_mod.Metadata{
|
||||
id: 2
|
||||
name: 'test_link'
|
||||
path: '/parent_dir/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
|
||||
@@ -16,15 +16,8 @@ pub fn (mut fs DatabaseVFS) directory_mkdir(mut dir Directory, name_ string) !&D
|
||||
}
|
||||
}
|
||||
|
||||
path := if dir.metadata.path == '/' {
|
||||
'/${name}'
|
||||
} else {
|
||||
"/${dir.metadata.path.trim('/')}/${name}"
|
||||
}
|
||||
|
||||
new_dir := fs.new_directory(
|
||||
name: name,
|
||||
path: path
|
||||
parent_id: dir.metadata.id
|
||||
)!
|
||||
dir.children << new_dir.metadata.id
|
||||
@@ -35,7 +28,6 @@ pub fn (mut fs DatabaseVFS) directory_mkdir(mut dir Directory, name_ string) !&D
|
||||
pub struct NewDirectory {
|
||||
pub:
|
||||
name string @[required] // name of file or directory
|
||||
path string @[required] // name of file or directory
|
||||
mode u32 = 0o755 // file permissions
|
||||
owner string = 'user'
|
||||
group string = 'user'
|
||||
@@ -47,15 +39,15 @@ pub:
|
||||
pub fn (mut fs DatabaseVFS) new_directory(dir NewDirectory) !&Directory {
|
||||
d := Directory{
|
||||
parent_id: dir.parent_id
|
||||
metadata: fs.new_metadata(NewMetadata{
|
||||
metadata: vfs.new_metadata(
|
||||
id: fs.get_next_id()
|
||||
name: dir.name
|
||||
path: dir.path
|
||||
mode: dir.mode
|
||||
owner: dir.owner
|
||||
group: dir.group
|
||||
size: u64(0)
|
||||
file_type: .directory
|
||||
})
|
||||
)
|
||||
children: dir.children
|
||||
}
|
||||
// Save new directory to DB
|
||||
@@ -100,12 +92,6 @@ pub fn (mut fs DatabaseVFS) directory_touch(mut dir Directory, name_ string) !&F
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
path := if dir.metadata.path == '/' {
|
||||
'/${name}'
|
||||
} else {
|
||||
"/${dir.metadata.path.trim('/')}/${name}"
|
||||
}
|
||||
|
||||
// Create new file with correct parent_id
|
||||
mut file_id := fs.save_file(File{
|
||||
@@ -113,7 +99,6 @@ pub fn (mut fs DatabaseVFS) directory_touch(mut dir Directory, name_ string) !&F
|
||||
metadata: vfs.Metadata {
|
||||
id: fs.get_next_id()
|
||||
name: name
|
||||
path: path
|
||||
file_type: .file
|
||||
created_at: time.now().unix()
|
||||
modified_at: time.now().unix()
|
||||
@@ -148,7 +133,9 @@ pub fn (mut fs DatabaseVFS) directory_rm(mut dir Directory, name string) ! {
|
||||
}
|
||||
|
||||
// get entry from db_metadata
|
||||
metadata_bytes := fs.db_metadata.get(fs.get_database_id(entry.metadata.id)!) or { return error('Failed to delete entry: ${err}') }
|
||||
metadata_bytes := fs.db_metadata.get(
|
||||
fs.id_table[entry.metadata.id] or { return error('Failed to delete entry') }
|
||||
) or { return error('Failed to delete entry: ${err}') }
|
||||
|
||||
// Handle file data deletion if it's a file
|
||||
if entry is File {
|
||||
@@ -163,7 +150,9 @@ pub fn (mut fs DatabaseVFS) directory_rm(mut dir Directory, name string) ! {
|
||||
log.debug('[DatabaseVFS] Deleting file metadata ${file.metadata.id}')
|
||||
}
|
||||
|
||||
fs.db_metadata.delete(fs.get_database_id(entry.metadata.id)!) or { return error('Failed to delete entry: ${err}') }
|
||||
fs.db_metadata.delete(
|
||||
fs.id_table[entry.metadata.id] or { return error('Failed to delete entry') }
|
||||
) or { return error('Failed to delete entry: ${err}') }
|
||||
|
||||
// Update children list - make sure we don't remove the wrong child
|
||||
dir.children = dir.children.filter(it != entry.metadata.id).clone()
|
||||
@@ -202,16 +191,10 @@ pub fn (mut fs DatabaseVFS) directory_move(dir_ Directory, args_ MoveDirArgs) !&
|
||||
found = true
|
||||
child_id_to_remove = child_id
|
||||
|
||||
new_path := if args.dst_parent_dir.metadata.path == '/' {
|
||||
'/${args.dst_entry_name}'
|
||||
} else {
|
||||
"/${args.dst_parent_dir.metadata.path.trim('/')}/${args.dst_entry_name}"
|
||||
}
|
||||
// Handle both files and directories
|
||||
if entry is File {
|
||||
mut file_entry := entry as File
|
||||
file_entry.metadata.name = args.dst_entry_name
|
||||
file_entry.metadata.path = new_path
|
||||
file_entry.metadata.modified_at = time.now().unix()
|
||||
file_entry.parent_id = args.dst_parent_dir.metadata.id
|
||||
|
||||
@@ -233,7 +216,6 @@ pub fn (mut fs DatabaseVFS) directory_move(dir_ Directory, args_ MoveDirArgs) !&
|
||||
// Handle directory
|
||||
mut dir_entry := entry as Directory
|
||||
dir_entry.metadata.name = args.dst_entry_name
|
||||
dir_entry.metadata.path = new_path
|
||||
dir_entry.metadata.modified_at = time.now().unix()
|
||||
dir_entry.parent_id = args.dst_parent_dir.metadata.id
|
||||
|
||||
@@ -270,7 +252,6 @@ fn (mut fs DatabaseVFS) move_children_recursive(mut dir Directory) ! {
|
||||
for child in dir.children {
|
||||
if mut child_entry := fs.load_entry(child) {
|
||||
child_entry.parent_id = dir.metadata.id
|
||||
child_entry.metadata.path = '${dir.metadata.path}/${child_entry.metadata.name}'
|
||||
|
||||
if child_entry is Directory {
|
||||
// Recursively move subdirectories
|
||||
@@ -304,15 +285,31 @@ pub fn (mut fs DatabaseVFS) directory_copy(mut dir Directory, args_ CopyDirArgs)
|
||||
for child_id in dir.children {
|
||||
if mut entry := fs.load_entry(child_id) {
|
||||
if entry.metadata.name == args.src_entry_name {
|
||||
if entry is File {
|
||||
return error('${args.src_entry_name} is a file, not a directory')
|
||||
}
|
||||
|
||||
if entry is Symlink {
|
||||
return error('${args.src_entry_name} is a symlink, not a directory')
|
||||
}
|
||||
|
||||
found = true
|
||||
if entry is File {
|
||||
mut file_entry := entry as File
|
||||
mut new_file := File{
|
||||
...file_entry,
|
||||
metadata: Metadata{...file_entry.metadata,
|
||||
id: fs.get_next_id()
|
||||
name: args.dst_entry_name
|
||||
}
|
||||
parent_id: args.dst_parent_dir.metadata.id
|
||||
}
|
||||
fs.save_entry(new_file)!
|
||||
args.dst_parent_dir.children << new_file.metadata.id
|
||||
fs.save_entry(args.dst_parent_dir)!
|
||||
return args.dst_parent_dir
|
||||
} else if entry is Symlink {
|
||||
mut symlink_entry := entry as Symlink
|
||||
mut new_symlink := Symlink{...symlink_entry,
|
||||
parent_id: args.dst_parent_dir.metadata.id
|
||||
}
|
||||
args.dst_parent_dir.children << new_symlink.metadata.id
|
||||
fs.save_entry(args.dst_parent_dir)!
|
||||
return args.dst_parent_dir
|
||||
}
|
||||
|
||||
mut src_dir := entry as Directory
|
||||
|
||||
// Make sure we have the latest version of the source directory
|
||||
@@ -379,7 +376,6 @@ fn (mut fs DatabaseVFS) copy_children_recursive(mut src_dir Directory, mut dst_d
|
||||
metadata: Metadata{
|
||||
...entry_.metadata
|
||||
id: fs.get_next_id()
|
||||
path: '${dst_dir.metadata.path}/${entry_.metadata.name}'
|
||||
}
|
||||
children: []u32{}
|
||||
parent_id: dst_dir.metadata.id
|
||||
@@ -395,7 +391,6 @@ fn (mut fs DatabaseVFS) copy_children_recursive(mut src_dir Directory, mut dst_d
|
||||
metadata: vfs.Metadata{
|
||||
...entry_.metadata
|
||||
id: fs.get_next_id()
|
||||
path: '${dst_dir.metadata.path}/${entry_.metadata.name}'
|
||||
}
|
||||
chunk_ids: entry_.chunk_ids
|
||||
parent_id: dst_dir.metadata.id
|
||||
@@ -409,7 +404,6 @@ fn (mut fs DatabaseVFS) copy_children_recursive(mut src_dir Directory, mut dst_d
|
||||
metadata: Metadata{
|
||||
...entry_.metadata
|
||||
id: fs.get_next_id()
|
||||
path: '${dst_dir.metadata.path}/${entry_.metadata.name}'
|
||||
}
|
||||
target: entry_.target
|
||||
parent_id: dst_dir.metadata.id
|
||||
@@ -436,21 +430,18 @@ pub fn (mut fs DatabaseVFS) directory_rename(dir Directory, src_name string, dst
|
||||
if mut entry is Directory {
|
||||
// Handle directory rename
|
||||
entry.metadata.name = dst_name
|
||||
entry.metadata.path = "${entry.metadata.path.all_before_last('/')}/${dst_name}"
|
||||
entry.metadata.modified_at = time.now().unix()
|
||||
fs.save_entry(entry)!
|
||||
return entry
|
||||
} else if mut entry is File {
|
||||
// Handle file rename
|
||||
entry.metadata.name = dst_name
|
||||
entry.metadata.path = "${entry.metadata.path.all_before_last('/')}/${dst_name}"
|
||||
entry.metadata.modified_at = time.now().unix()
|
||||
fs.save_entry(entry)!
|
||||
return entry
|
||||
} else if mut entry is Symlink {
|
||||
// Handle symlink rename
|
||||
entry.metadata.name = dst_name
|
||||
entry.metadata.path = "${entry.metadata.path.all_before_last('/')}/${dst_name}"
|
||||
entry.metadata.modified_at = time.now().unix()
|
||||
fs.save_entry(entry)!
|
||||
return entry
|
||||
|
||||
@@ -12,12 +12,10 @@ fn setup_fs() !(&DatabaseVFS, string) {
|
||||
// Create separate databases for data and metadata
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
// Create VFS with separate databases for data and metadata
|
||||
@@ -38,7 +36,6 @@ fn test_new_directory() ! {
|
||||
// Test creating a new directory
|
||||
mut dir := fs.new_directory(
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
)!
|
||||
|
||||
// Verify the directory
|
||||
@@ -60,7 +57,6 @@ fn test_new_directory_with_custom_permissions() ! {
|
||||
// Test creating a directory with custom permissions
|
||||
mut dir := fs.new_directory(
|
||||
name: 'custom_dir'
|
||||
path: '/custom_dir'
|
||||
mode: 0o700
|
||||
owner: 'admin'
|
||||
group: 'staff'
|
||||
@@ -86,7 +82,6 @@ fn test_copy_directory() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'original_dir'
|
||||
path: '/original_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -123,7 +118,6 @@ fn test_directory_mkdir() ! {
|
||||
// Create a parent directory
|
||||
mut parent_dir := fs.new_directory(
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
)!
|
||||
|
||||
// Test creating a subdirectory
|
||||
@@ -155,7 +149,6 @@ fn test_directory_touch() ! {
|
||||
// Create a parent directory
|
||||
mut parent_dir := fs.new_directory(
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
)!
|
||||
|
||||
// Test creating a file
|
||||
@@ -196,7 +189,6 @@ fn test_directory_rm() ! {
|
||||
// Create a parent directory
|
||||
mut parent_dir := fs.new_directory(
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
)!
|
||||
|
||||
// Create a file to remove
|
||||
@@ -244,7 +236,6 @@ fn test_directory_rename() ! {
|
||||
// Create a parent directory
|
||||
mut parent_dir := fs.new_directory(
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
)!
|
||||
|
||||
// Create a subdirectory to rename
|
||||
@@ -273,7 +264,6 @@ fn test_directory_children() ! {
|
||||
// Create a parent directory
|
||||
mut parent_dir := fs.new_directory(
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
)!
|
||||
|
||||
// Initially, the directory should be empty
|
||||
@@ -317,8 +307,8 @@ fn test_directory_move() ! {
|
||||
}
|
||||
|
||||
// Create source and destination parent directories
|
||||
mut src_parent := fs.new_directory(name: 'src_parent', path: '/src_parent')!
|
||||
mut dst_parent := fs.new_directory(name: 'dst_parent', path: '/dst_parent')!
|
||||
mut src_parent := fs.new_directory(name: 'src_parent')!
|
||||
mut dst_parent := fs.new_directory(name: 'dst_parent')!
|
||||
|
||||
// Create a directory to move with nested structure
|
||||
mut dir_to_move := fs.directory_mkdir(mut src_parent, 'dir_to_move')!
|
||||
@@ -400,8 +390,8 @@ fn test_directory_copy() ! {
|
||||
}
|
||||
|
||||
// Create source and destination parent directories
|
||||
mut src_parent := fs.new_directory(name: 'src_parent', path: '/src_parent')!
|
||||
mut dst_parent := fs.new_directory(name: 'dst_parent', path: '/dst_parent')!
|
||||
mut src_parent := fs.new_directory(name: 'src_parent')!
|
||||
mut dst_parent := fs.new_directory(name: 'dst_parent')!
|
||||
|
||||
// Create a directory to copy with nested structure
|
||||
mut dir_to_copy := fs.directory_mkdir(mut src_parent, 'dir_to_copy')!
|
||||
@@ -493,7 +483,6 @@ fn test_directory_add_symlink() ! {
|
||||
// Create a parent directory
|
||||
mut parent_dir := fs.new_directory(
|
||||
name: 'parent_dir'
|
||||
path: '/parent_dir'
|
||||
)!
|
||||
|
||||
// Create a symlink
|
||||
@@ -501,7 +490,6 @@ fn test_directory_add_symlink() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: fs.get_next_id()
|
||||
name: 'test_link'
|
||||
path: '/parent_dir/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
|
||||
@@ -1,90 +0,0 @@
|
||||
module vfs_db
|
||||
|
||||
import freeflowuniverse.herolib.vfs
|
||||
import os
|
||||
import time
|
||||
|
||||
// Implementation of VFSImplementation interface
|
||||
pub fn (mut fs DatabaseVFS) root_get_as_dir() !&Directory {
|
||||
// Try to load root directory from DB if it exists
|
||||
if fs.root_id in fs.id_table {
|
||||
if data := fs.db_metadata.get(fs.get_database_id(fs.root_id)!) {
|
||||
mut loaded_root := decode_directory(data) or {
|
||||
return error('Failed to decode root directory: ${err}')
|
||||
}
|
||||
return &loaded_root
|
||||
}
|
||||
}
|
||||
|
||||
// Create and save new root directory
|
||||
mut myroot := Directory{
|
||||
metadata: vfs.Metadata{
|
||||
id: fs.get_next_id()
|
||||
file_type: .directory
|
||||
name: ''
|
||||
path: '/'
|
||||
created_at: time.now().unix()
|
||||
modified_at: time.now().unix()
|
||||
accessed_at: time.now().unix()
|
||||
mode: 0o755 // default directory permissions
|
||||
owner: 'user' // TODO: get from system
|
||||
group: 'user' // TODO: get from system
|
||||
}
|
||||
parent_id: 0
|
||||
}
|
||||
fs.root_id = fs.save_entry(myroot)!
|
||||
return &myroot
|
||||
}
|
||||
|
||||
fn (mut self DatabaseVFS) get_entry(path_ string) !FSEntry {
|
||||
path := '${path_.trim_left('/').trim_right('/')}'
|
||||
if path == '/' || path == '' || path == '.' {
|
||||
return FSEntry(self.root_get_as_dir()!)
|
||||
}
|
||||
|
||||
parts := path.split('/')
|
||||
mut parent_dir := *self.root_get_as_dir()!
|
||||
for i, part in parts {
|
||||
entry := self.directory_get_entry(parent_dir, part) or {
|
||||
return error('Failed to get entry ${err}')
|
||||
}
|
||||
if i == parts.len - 1 {
|
||||
// last part, means entry is found
|
||||
return entry
|
||||
}
|
||||
if entry is Directory {
|
||||
parent_dir = entry
|
||||
} else {
|
||||
return error('Failed to get entry, expected dir')
|
||||
}
|
||||
}
|
||||
// mut current := *self.root_get_as_dir()!
|
||||
// return self.directory_get_entry(mut current, path) or {
|
||||
return error('Path not found: ${path}')
|
||||
// }
|
||||
}
|
||||
|
||||
// internal function to get an entry of some name from a directory
|
||||
fn (mut self DatabaseVFS) directory_get_entry(dir Directory, name string) ?FSEntry {
|
||||
// mut children := self.directory_children(mut dir, false) or {
|
||||
// panic('this should never happen')
|
||||
// }
|
||||
for child_id in dir.children {
|
||||
if entry := self.load_entry(child_id) {
|
||||
if entry.metadata.name == name {
|
||||
return entry
|
||||
}
|
||||
} else {
|
||||
panic('Filesystem is corrupted, this should never happen ${err}')
|
||||
}
|
||||
}
|
||||
return none
|
||||
}
|
||||
|
||||
fn (mut self DatabaseVFS) get_directory(path string) !&Directory {
|
||||
mut entry := self.get_entry(path)!
|
||||
if mut entry is Directory {
|
||||
return &entry
|
||||
}
|
||||
return error('Not a directory: ${path}')
|
||||
}
|
||||
@@ -16,30 +16,27 @@ pub fn (mut self DatabaseVFS) file_create(path_ string) !vfs.FSEntry {
|
||||
// Get parent directory
|
||||
parent_path := os.dir(path)
|
||||
file_name := os.base(path)
|
||||
|
||||
mut parent_dir := self.get_directory(parent_path)!
|
||||
log.info('[DatabaseVFS] Creating file ${file_name} in ${parent_path}')
|
||||
log.info('[DatabaseVFS] Creating file ${file_name} in ${parent_path} for ${path_}')
|
||||
mut parent_dir := self.get_directory(parent_path) or {
|
||||
return error('Failed to get parent directory ${parent_path}: ${err}')
|
||||
}
|
||||
entry := self.directory_touch(mut parent_dir, file_name)!
|
||||
log.info('[DatabaseVFS] Created file ${file_name} in ${parent_path}')
|
||||
return entry
|
||||
}
|
||||
|
||||
pub fn (mut self DatabaseVFS) file_read(path_ string) ![]u8 {
|
||||
path := '/${path_.trim_left('/').trim_right('/')}'
|
||||
path := texttools.path_fix(path_)
|
||||
log.info('[DatabaseVFS] Reading file ${path}')
|
||||
mut file := self.get_entry(path)!
|
||||
log.info('[DatabaseVFS] Got file ${path}')
|
||||
if mut file is File {
|
||||
metadata := self.db_metadata.get(self.get_database_id(file.metadata.id)!) or {
|
||||
return error('Failed to get file metadata ${err}')
|
||||
}
|
||||
mut decoded_file := decode_file_metadata(metadata) or { return error('Failed to decode file: ${err}') }
|
||||
println('debugzo-1 ${decoded_file.chunk_ids}')
|
||||
mut file_data := []u8{}
|
||||
// log.debug('[DatabaseVFS] Got database chunk ids ${chunk_ids}')
|
||||
for id in decoded_file.chunk_ids {
|
||||
log.debug('[DatabaseVFS] Getting chunk ${id}')
|
||||
// there were chunk ids stored with file so file has data
|
||||
if chunk_bytes := self.db_data.get(id) {
|
||||
mut file_data := []u8{}
|
||||
// log.debug('[DatabaseVFS] Got database chunk ids ${chunk_ids}')
|
||||
for id in file.chunk_ids {
|
||||
log.debug('[DatabaseVFS] Getting chunk ${id}')
|
||||
// there were chunk ids stored with file so file has data
|
||||
if chunk_bytes := self.db_data.get(id) {
|
||||
file_data << chunk_bytes
|
||||
} else {
|
||||
return error('Failed to fetch file data: ${err}')
|
||||
@@ -51,17 +48,21 @@ pub fn (mut self DatabaseVFS) file_read(path_ string) ![]u8 {
|
||||
}
|
||||
|
||||
pub fn (mut self DatabaseVFS) file_write(path_ string, data []u8) ! {
|
||||
path := os.abs_path(path_)
|
||||
path := texttools.path_fix(path_)
|
||||
|
||||
if mut entry := self.get_entry(path) {
|
||||
if mut entry is File {
|
||||
log.info('[DatabaseVFS] Writing ${data.len} bytes to ${path}')
|
||||
self.save_file(entry, data)!
|
||||
self.save_file(entry, data) or {
|
||||
return error('Failed to save file: ${err}')
|
||||
}
|
||||
} else {
|
||||
panic('handle error')
|
||||
}
|
||||
} else {
|
||||
self.file_create(path)!
|
||||
self.file_create(path) or {
|
||||
return error('Failed to create file: ${err}')
|
||||
}
|
||||
self.file_write(path, data)!
|
||||
}
|
||||
}
|
||||
@@ -123,7 +124,6 @@ pub fn (mut self DatabaseVFS) link_create(target_path string, link_path string)
|
||||
metadata: vfs.Metadata{
|
||||
id: self.get_next_id()
|
||||
name: link_name
|
||||
path: link_path
|
||||
file_type: .symlink
|
||||
created_at: time.now().unix()
|
||||
modified_at: time.now().unix()
|
||||
@@ -168,12 +168,13 @@ pub fn (mut self DatabaseVFS) link_delete(path string) ! {
|
||||
return true
|
||||
}
|
||||
// self.print() or {panic(err)}
|
||||
log.info('[DatabaseVFS] Checking path exists ${path}')
|
||||
log.debug('[DatabaseVFS] Checking path exists ${path}')
|
||||
self.get_entry(path) or { return false }
|
||||
return true
|
||||
}
|
||||
|
||||
pub fn (mut fs DatabaseVFS) get(path string) !vfs.FSEntry {
|
||||
pub fn (mut fs DatabaseVFS) get(path_ string) !vfs.FSEntry {
|
||||
path := texttools.path_fix(path_)
|
||||
log.info('[DatabaseVFS] Getting filesystem entry ${path}')
|
||||
return fs.get_entry(path)!
|
||||
}
|
||||
@@ -188,7 +189,9 @@ pub fn (mut self DatabaseVFS) rename(old_path string, new_path string) !vfs.FSEn
|
||||
return self.directory_rename(src_parent_dir, src_name, dst_name)!
|
||||
}
|
||||
|
||||
pub fn (mut self DatabaseVFS) copy(src_path string, dst_path string) !vfs.FSEntry {
|
||||
pub fn (mut self DatabaseVFS) copy(src_path_ string, dst_path_ string) !vfs.FSEntry {
|
||||
src_path := texttools.path_fix_absolute(src_path_)
|
||||
dst_path := texttools.path_fix_absolute(dst_path_)
|
||||
log.info('[DatabaseVFS] Copying ${src_path} to ${dst_path}')
|
||||
src_parent_path := os.dir(src_path)
|
||||
dst_parent_path := os.dir(dst_path)
|
||||
@@ -220,13 +223,13 @@ pub fn (mut self DatabaseVFS) copy(src_path string, dst_path string) !vfs.FSEntr
|
||||
|
||||
// copy_file creates a copy of a file
|
||||
pub fn (mut self DatabaseVFS) copy_file(file File) !&File {
|
||||
log.info('[DatabaseVFS] Copying file ${file.metadata.path}')
|
||||
log.info('[DatabaseVFS] Copying file ${file.metadata.name}')
|
||||
|
||||
// Save the file with its metadata and data
|
||||
file_id := self.save_file(file, [])!
|
||||
self.save_file(file, [])!
|
||||
|
||||
// Load the file from the database
|
||||
mut entry := self.load_entry(file_id)!
|
||||
mut entry := self.load_entry(file.metadata.id)!
|
||||
if mut entry is File {
|
||||
return &entry
|
||||
}
|
||||
@@ -234,10 +237,9 @@ pub fn (mut self DatabaseVFS) copy_file(file File) !&File {
|
||||
}
|
||||
|
||||
pub fn (mut self DatabaseVFS) move(src_path string, dst_path string) !vfs.FSEntry {
|
||||
log.info('[DatabaseVFS] Moving ${src_path} to ${dst_path}')
|
||||
|
||||
src_parent_path := os.dir(src_path)
|
||||
dst_parent_path := os.dir(dst_path)
|
||||
log.info('[DatabaseVFS] Moving ${texttools.path_fix(src_path)} to ${texttools.path_fix(dst_path)}')
|
||||
src_parent_path := os.dir(texttools.path_fix_absolute(src_path))
|
||||
dst_parent_path := os.dir(texttools.path_fix_absolute(dst_path))
|
||||
|
||||
if !self.exists(src_parent_path) {
|
||||
return error('${src_parent_path} does not exist')
|
||||
@@ -275,7 +277,7 @@ pub fn (mut self DatabaseVFS) delete(path_ string) ! {
|
||||
mut parent_dir := self.get_directory(parent_path)!
|
||||
|
||||
self.directory_rm(mut parent_dir, file_name) or {
|
||||
log.error('[DatabaseVFS] Failed to remove ${file_name} from ${parent_dir.metadata.path}\n${err}')
|
||||
log.error('[DatabaseVFS] Failed to remove ${file_name} from ${parent_dir.metadata.name}\n${err}')
|
||||
return err
|
||||
}
|
||||
}
|
||||
|
||||
@@ -11,12 +11,10 @@ fn setup_vfs() !(&DatabaseVFS, string) {
|
||||
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut vfs := new(mut db_data, mut db_metadata)!
|
||||
|
||||
@@ -12,12 +12,10 @@ fn setup_fs() !(&DatabaseVFS, string) {
|
||||
// Create separate databases for data and metadata
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
// Create VFS with separate databases for data and metadata
|
||||
@@ -38,7 +36,6 @@ fn test_directory_print_empty() ! {
|
||||
// Create an empty directory
|
||||
mut dir := fs.new_directory(
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
)!
|
||||
|
||||
// Test printing the empty directory
|
||||
@@ -57,7 +54,6 @@ fn test_directory_print_with_contents() ! {
|
||||
// Create a directory with various contents
|
||||
mut dir := fs.new_directory(
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
)!
|
||||
|
||||
// Add a subdirectory
|
||||
@@ -71,7 +67,6 @@ fn test_directory_print_with_contents() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: fs.get_next_id()
|
||||
name: 'test_link'
|
||||
path: '/test_dir/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -105,7 +100,6 @@ fn test_directory_printall_simple() ! {
|
||||
// Create a simple directory structure
|
||||
mut dir := fs.new_directory(
|
||||
name: 'root_dir'
|
||||
path: '/root_dir'
|
||||
)!
|
||||
|
||||
// Add a file
|
||||
@@ -128,7 +122,6 @@ fn test_directory_printall_nested() ! {
|
||||
// Create a nested directory structure
|
||||
mut root := fs.new_directory(
|
||||
name: 'root'
|
||||
path: '/root'
|
||||
)!
|
||||
|
||||
// Add a subdirectory
|
||||
@@ -151,7 +144,6 @@ fn test_directory_printall_nested() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: fs.get_next_id()
|
||||
name: 'test_link'
|
||||
path: '/root/subdir1/subdir2/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -188,7 +180,6 @@ fn test_directory_printall_empty() ! {
|
||||
// Create an empty directory
|
||||
mut dir := fs.new_directory(
|
||||
name: 'empty_dir'
|
||||
path: '/empty_dir'
|
||||
)!
|
||||
|
||||
// Test printing the empty directory recursively
|
||||
@@ -12,12 +12,10 @@ fn setup_vfs() !(&DatabaseVFS, string) {
|
||||
// Create separate databases for data and metadata
|
||||
mut db_data := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'data')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
mut db_metadata := ourdb.new(
|
||||
path: os.join_path(test_data_dir, 'metadata')
|
||||
incremental_mode: false
|
||||
)!
|
||||
|
||||
// Create VFS with separate databases for data and metadata
|
||||
@@ -62,7 +60,6 @@ fn test_save_load_entry() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 1
|
||||
name: 'test_dir'
|
||||
path: '/test_dir'
|
||||
file_type: .directory
|
||||
size: 0
|
||||
mode: 0o755
|
||||
@@ -77,11 +74,10 @@ fn test_save_load_entry() ! {
|
||||
}
|
||||
|
||||
// Save the directory
|
||||
saved_id := vfs.save_entry(dir)!
|
||||
assert saved_id == 1
|
||||
vfs.save_entry(dir)!
|
||||
|
||||
// Load the directory
|
||||
loaded_entry := vfs.load_entry(1)!
|
||||
loaded_entry := vfs.load_entry(dir.metadata.id)!
|
||||
|
||||
// Verify it's the same directory
|
||||
loaded_dir := loaded_entry as Directory
|
||||
@@ -101,7 +97,6 @@ fn test_save_load_file_with_data() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 2
|
||||
name: 'test_file.txt'
|
||||
path: '/test_file.txt'
|
||||
file_type: .file
|
||||
size: 13
|
||||
mode: 0o644
|
||||
@@ -116,11 +111,10 @@ fn test_save_load_file_with_data() ! {
|
||||
}
|
||||
|
||||
// Save the file
|
||||
saved_id := vfs.save_entry(file)!
|
||||
assert saved_id == 2
|
||||
vfs.save_entry(file)!
|
||||
|
||||
// Load the file
|
||||
loaded_entry := vfs.load_entry(2)!
|
||||
loaded_entry := vfs.load_entry(file.metadata.id)!
|
||||
|
||||
// Verify it's the same file with the same data
|
||||
loaded_file := loaded_entry as File
|
||||
@@ -141,7 +135,6 @@ fn test_save_load_file_without_data() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 3
|
||||
name: 'empty_file.txt'
|
||||
path: '/empty_file.txt'
|
||||
file_type: .file
|
||||
size: 0
|
||||
mode: 0o644
|
||||
@@ -156,11 +149,10 @@ fn test_save_load_file_without_data() ! {
|
||||
}
|
||||
|
||||
// Save the file
|
||||
saved_id := vfs.save_entry(file)!
|
||||
assert saved_id == 3
|
||||
vfs.save_entry(file)!
|
||||
|
||||
// Load the file
|
||||
loaded_entry := vfs.load_entry(3)!
|
||||
loaded_entry := vfs.load_entry(file.metadata.id)!
|
||||
|
||||
// Verify it's the same file with empty data
|
||||
loaded_file := loaded_entry as File
|
||||
@@ -181,7 +173,6 @@ fn test_save_load_symlink() ! {
|
||||
metadata: vfs_mod.Metadata{
|
||||
id: 4
|
||||
name: 'test_link'
|
||||
path: '/test_link'
|
||||
file_type: .symlink
|
||||
size: 0
|
||||
mode: 0o777
|
||||
@@ -196,11 +187,10 @@ fn test_save_load_symlink() ! {
|
||||
}
|
||||
|
||||
// Save the symlink
|
||||
saved_id := vfs.save_entry(symlink)!
|
||||
assert saved_id == 4
|
||||
vfs.save_entry(symlink)!
|
||||
|
||||
// Load the symlink
|
||||
loaded_entry := vfs.load_entry(4)!
|
||||
loaded_entry := vfs.load_entry(symlink.metadata.id)!
|
||||
|
||||
// Verify it's the same symlink
|
||||
loaded_symlink := loaded_entry as Symlink
|
||||
@@ -220,6 +210,6 @@ fn test_load_nonexistent_entry() ! {
|
||||
if _ := vfs.load_entry(999) {
|
||||
assert false, 'Expected error when loading non-existent entry'
|
||||
} else {
|
||||
assert err.msg() == 'VFS ID 999 not found.'
|
||||
assert true
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user