305 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			305 lines
		
	
	
		
			9.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2010 The Go Authors. All rights reserved.
 | 
						|
// Use of this source code is governed by a BSD-style
 | 
						|
// license that can be found in the LICENSE file.
 | 
						|
 | 
						|
// +build linux
 | 
						|
 | 
						|
package fsnotify
 | 
						|
 | 
						|
import (
 | 
						|
	"errors"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"strings"
 | 
						|
	"sync"
 | 
						|
	"syscall"
 | 
						|
	"unsafe"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	// Options for inotify_init() are not exported
 | 
						|
	// sys_IN_CLOEXEC    uint32 = syscall.IN_CLOEXEC
 | 
						|
	// sys_IN_NONBLOCK   uint32 = syscall.IN_NONBLOCK
 | 
						|
 | 
						|
	// Options for AddWatch
 | 
						|
	sys_IN_DONT_FOLLOW uint32 = syscall.IN_DONT_FOLLOW
 | 
						|
	sys_IN_ONESHOT     uint32 = syscall.IN_ONESHOT
 | 
						|
	sys_IN_ONLYDIR     uint32 = syscall.IN_ONLYDIR
 | 
						|
 | 
						|
	// The "sys_IN_MASK_ADD" option is not exported, as AddWatch
 | 
						|
	// adds it automatically, if there is already a watch for the given path
 | 
						|
	// sys_IN_MASK_ADD      uint32 = syscall.IN_MASK_ADD
 | 
						|
 | 
						|
	// Events
 | 
						|
	sys_IN_ACCESS        uint32 = syscall.IN_ACCESS
 | 
						|
	sys_IN_ALL_EVENTS    uint32 = syscall.IN_ALL_EVENTS
 | 
						|
	sys_IN_ATTRIB        uint32 = syscall.IN_ATTRIB
 | 
						|
	sys_IN_CLOSE         uint32 = syscall.IN_CLOSE
 | 
						|
	sys_IN_CLOSE_NOWRITE uint32 = syscall.IN_CLOSE_NOWRITE
 | 
						|
	sys_IN_CLOSE_WRITE   uint32 = syscall.IN_CLOSE_WRITE
 | 
						|
	sys_IN_CREATE        uint32 = syscall.IN_CREATE
 | 
						|
	sys_IN_DELETE        uint32 = syscall.IN_DELETE
 | 
						|
	sys_IN_DELETE_SELF   uint32 = syscall.IN_DELETE_SELF
 | 
						|
	sys_IN_MODIFY        uint32 = syscall.IN_MODIFY
 | 
						|
	sys_IN_MOVE          uint32 = syscall.IN_MOVE
 | 
						|
	sys_IN_MOVED_FROM    uint32 = syscall.IN_MOVED_FROM
 | 
						|
	sys_IN_MOVED_TO      uint32 = syscall.IN_MOVED_TO
 | 
						|
	sys_IN_MOVE_SELF     uint32 = syscall.IN_MOVE_SELF
 | 
						|
	sys_IN_OPEN          uint32 = syscall.IN_OPEN
 | 
						|
 | 
						|
	sys_AGNOSTIC_EVENTS = sys_IN_MOVED_TO | sys_IN_MOVED_FROM | sys_IN_CREATE | sys_IN_ATTRIB | sys_IN_MODIFY | sys_IN_MOVE_SELF | sys_IN_DELETE | sys_IN_DELETE_SELF
 | 
						|
 | 
						|
	// Special events
 | 
						|
	sys_IN_ISDIR      uint32 = syscall.IN_ISDIR
 | 
						|
	sys_IN_IGNORED    uint32 = syscall.IN_IGNORED
 | 
						|
	sys_IN_Q_OVERFLOW uint32 = syscall.IN_Q_OVERFLOW
 | 
						|
	sys_IN_UNMOUNT    uint32 = syscall.IN_UNMOUNT
 | 
						|
)
 | 
						|
 | 
						|
type FileEvent struct {
 | 
						|
	mask   uint32 // Mask of events
 | 
						|
	cookie uint32 // Unique cookie associating related events (for rename(2))
 | 
						|
	Name   string // File name (optional)
 | 
						|
}
 | 
						|
 | 
						|
// IsCreate reports whether the FileEvent was triggered by a creation
 | 
						|
func (e *FileEvent) IsCreate() bool {
 | 
						|
	return (e.mask&sys_IN_CREATE) == sys_IN_CREATE || (e.mask&sys_IN_MOVED_TO) == sys_IN_MOVED_TO
 | 
						|
}
 | 
						|
 | 
						|
// IsDelete reports whether the FileEvent was triggered by a delete
 | 
						|
func (e *FileEvent) IsDelete() bool {
 | 
						|
	return (e.mask&sys_IN_DELETE_SELF) == sys_IN_DELETE_SELF || (e.mask&sys_IN_DELETE) == sys_IN_DELETE
 | 
						|
}
 | 
						|
 | 
						|
// IsModify reports whether the FileEvent was triggered by a file modification or attribute change
 | 
						|
func (e *FileEvent) IsModify() bool {
 | 
						|
	return ((e.mask&sys_IN_MODIFY) == sys_IN_MODIFY || (e.mask&sys_IN_ATTRIB) == sys_IN_ATTRIB)
 | 
						|
}
 | 
						|
 | 
						|
// IsRename reports whether the FileEvent was triggered by a change name
 | 
						|
func (e *FileEvent) IsRename() bool {
 | 
						|
	return ((e.mask&sys_IN_MOVE_SELF) == sys_IN_MOVE_SELF || (e.mask&sys_IN_MOVED_FROM) == sys_IN_MOVED_FROM)
 | 
						|
}
 | 
						|
 | 
						|
// IsAttrib reports whether the FileEvent was triggered by a change in the file metadata.
 | 
						|
func (e *FileEvent) IsAttrib() bool {
 | 
						|
	return (e.mask & sys_IN_ATTRIB) == sys_IN_ATTRIB
 | 
						|
}
 | 
						|
 | 
						|
type watch struct {
 | 
						|
	wd    uint32 // Watch descriptor (as returned by the inotify_add_watch() syscall)
 | 
						|
	flags uint32 // inotify flags of this watch (see inotify(7) for the list of valid flags)
 | 
						|
}
 | 
						|
 | 
						|
type Watcher struct {
 | 
						|
	mu            sync.Mutex        // Map access
 | 
						|
	fd            int               // File descriptor (as returned by the inotify_init() syscall)
 | 
						|
	watches       map[string]*watch // Map of inotify watches (key: path)
 | 
						|
	fsnFlags      map[string]uint32 // Map of watched files to flags used for filter
 | 
						|
	fsnmut        sync.Mutex        // Protects access to fsnFlags.
 | 
						|
	paths         map[int]string    // Map of watched paths (key: watch descriptor)
 | 
						|
	Error         chan error        // Errors are sent on this channel
 | 
						|
	internalEvent chan *FileEvent   // Events are queued on this channel
 | 
						|
	Event         chan *FileEvent   // Events are returned on this channel
 | 
						|
	done          chan bool         // Channel for sending a "quit message" to the reader goroutine
 | 
						|
	isClosed      bool              // Set to true when Close() is first called
 | 
						|
}
 | 
						|
 | 
						|
// NewWatcher creates and returns a new inotify instance using inotify_init(2)
 | 
						|
func NewWatcher() (*Watcher, error) {
 | 
						|
	fd, errno := syscall.InotifyInit()
 | 
						|
	if fd == -1 {
 | 
						|
		return nil, os.NewSyscallError("inotify_init", errno)
 | 
						|
	}
 | 
						|
	w := &Watcher{
 | 
						|
		fd:            fd,
 | 
						|
		watches:       make(map[string]*watch),
 | 
						|
		fsnFlags:      make(map[string]uint32),
 | 
						|
		paths:         make(map[int]string),
 | 
						|
		internalEvent: make(chan *FileEvent),
 | 
						|
		Event:         make(chan *FileEvent),
 | 
						|
		Error:         make(chan error),
 | 
						|
		done:          make(chan bool, 1),
 | 
						|
	}
 | 
						|
 | 
						|
	go w.readEvents()
 | 
						|
	go w.purgeEvents()
 | 
						|
	return w, nil
 | 
						|
}
 | 
						|
 | 
						|
// Close closes an inotify watcher instance
 | 
						|
// It sends a message to the reader goroutine to quit and removes all watches
 | 
						|
// associated with the inotify instance
 | 
						|
func (w *Watcher) Close() error {
 | 
						|
	if w.isClosed {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	w.isClosed = true
 | 
						|
 | 
						|
	// Remove all watches
 | 
						|
	for path := range w.watches {
 | 
						|
		w.RemoveWatch(path)
 | 
						|
	}
 | 
						|
 | 
						|
	// Send "quit" message to the reader goroutine
 | 
						|
	w.done <- true
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// AddWatch adds path to the watched file set.
 | 
						|
// The flags are interpreted as described in inotify_add_watch(2).
 | 
						|
func (w *Watcher) addWatch(path string, flags uint32) error {
 | 
						|
	if w.isClosed {
 | 
						|
		return errors.New("inotify instance already closed")
 | 
						|
	}
 | 
						|
 | 
						|
	w.mu.Lock()
 | 
						|
	watchEntry, found := w.watches[path]
 | 
						|
	w.mu.Unlock()
 | 
						|
	if found {
 | 
						|
		watchEntry.flags |= flags
 | 
						|
		flags |= syscall.IN_MASK_ADD
 | 
						|
	}
 | 
						|
	wd, errno := syscall.InotifyAddWatch(w.fd, path, flags)
 | 
						|
	if wd == -1 {
 | 
						|
		return errno
 | 
						|
	}
 | 
						|
 | 
						|
	w.mu.Lock()
 | 
						|
	w.watches[path] = &watch{wd: uint32(wd), flags: flags}
 | 
						|
	w.paths[wd] = path
 | 
						|
	w.mu.Unlock()
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// Watch adds path to the watched file set, watching all events.
 | 
						|
func (w *Watcher) watch(path string) error {
 | 
						|
	return w.addWatch(path, sys_AGNOSTIC_EVENTS)
 | 
						|
}
 | 
						|
 | 
						|
// RemoveWatch removes path from the watched file set.
 | 
						|
func (w *Watcher) removeWatch(path string) error {
 | 
						|
	w.mu.Lock()
 | 
						|
	defer w.mu.Unlock()
 | 
						|
	watch, ok := w.watches[path]
 | 
						|
	if !ok {
 | 
						|
		return errors.New(fmt.Sprintf("can't remove non-existent inotify watch for: %s", path))
 | 
						|
	}
 | 
						|
	success, errno := syscall.InotifyRmWatch(w.fd, watch.wd)
 | 
						|
	if success == -1 {
 | 
						|
		return os.NewSyscallError("inotify_rm_watch", errno)
 | 
						|
	}
 | 
						|
	delete(w.watches, path)
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// readEvents reads from the inotify file descriptor, converts the
 | 
						|
// received events into Event objects and sends them via the Event channel
 | 
						|
func (w *Watcher) readEvents() {
 | 
						|
	var (
 | 
						|
		buf   [syscall.SizeofInotifyEvent * 4096]byte // Buffer for a maximum of 4096 raw events
 | 
						|
		n     int                                     // Number of bytes read with read()
 | 
						|
		errno error                                   // Syscall errno
 | 
						|
	)
 | 
						|
 | 
						|
	for {
 | 
						|
		// See if there is a message on the "done" channel
 | 
						|
		select {
 | 
						|
		case <-w.done:
 | 
						|
			syscall.Close(w.fd)
 | 
						|
			close(w.internalEvent)
 | 
						|
			close(w.Error)
 | 
						|
			return
 | 
						|
		default:
 | 
						|
		}
 | 
						|
 | 
						|
		n, errno = syscall.Read(w.fd, buf[:])
 | 
						|
 | 
						|
		// If EOF is received
 | 
						|
		if n == 0 {
 | 
						|
			syscall.Close(w.fd)
 | 
						|
			close(w.internalEvent)
 | 
						|
			close(w.Error)
 | 
						|
			return
 | 
						|
		}
 | 
						|
 | 
						|
		if n < 0 {
 | 
						|
			w.Error <- os.NewSyscallError("read", errno)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		if n < syscall.SizeofInotifyEvent {
 | 
						|
			w.Error <- errors.New("inotify: short read in readEvents()")
 | 
						|
			continue
 | 
						|
		}
 | 
						|
 | 
						|
		var offset uint32 = 0
 | 
						|
		// We don't know how many events we just read into the buffer
 | 
						|
		// While the offset points to at least one whole event...
 | 
						|
		for offset <= uint32(n-syscall.SizeofInotifyEvent) {
 | 
						|
			// Point "raw" to the event in the buffer
 | 
						|
			raw := (*syscall.InotifyEvent)(unsafe.Pointer(&buf[offset]))
 | 
						|
			event := new(FileEvent)
 | 
						|
			event.mask = uint32(raw.Mask)
 | 
						|
			event.cookie = uint32(raw.Cookie)
 | 
						|
			nameLen := uint32(raw.Len)
 | 
						|
			// If the event happened to the watched directory or the watched file, the kernel
 | 
						|
			// doesn't append the filename to the event, but we would like to always fill the
 | 
						|
			// the "Name" field with a valid filename. We retrieve the path of the watch from
 | 
						|
			// the "paths" map.
 | 
						|
			w.mu.Lock()
 | 
						|
			event.Name = w.paths[int(raw.Wd)]
 | 
						|
			w.mu.Unlock()
 | 
						|
			watchedName := event.Name
 | 
						|
			if nameLen > 0 {
 | 
						|
				// Point "bytes" at the first byte of the filename
 | 
						|
				bytes := (*[syscall.PathMax]byte)(unsafe.Pointer(&buf[offset+syscall.SizeofInotifyEvent]))
 | 
						|
				// The filename is padded with NUL bytes. TrimRight() gets rid of those.
 | 
						|
				event.Name += "/" + strings.TrimRight(string(bytes[0:nameLen]), "\000")
 | 
						|
			}
 | 
						|
 | 
						|
			// Send the events that are not ignored on the events channel
 | 
						|
			if !event.ignoreLinux() {
 | 
						|
				// Setup FSNotify flags (inherit from directory watch)
 | 
						|
				w.fsnmut.Lock()
 | 
						|
				if _, fsnFound := w.fsnFlags[event.Name]; !fsnFound {
 | 
						|
					if fsnFlags, watchFound := w.fsnFlags[watchedName]; watchFound {
 | 
						|
						w.fsnFlags[event.Name] = fsnFlags
 | 
						|
					} else {
 | 
						|
						w.fsnFlags[event.Name] = FSN_ALL
 | 
						|
					}
 | 
						|
				}
 | 
						|
				w.fsnmut.Unlock()
 | 
						|
 | 
						|
				w.internalEvent <- event
 | 
						|
			}
 | 
						|
 | 
						|
			// Move to the next event in the buffer
 | 
						|
			offset += syscall.SizeofInotifyEvent + nameLen
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Certain types of events can be "ignored" and not sent over the Event
 | 
						|
// channel. Such as events marked ignore by the kernel, or MODIFY events
 | 
						|
// against files that do not exist.
 | 
						|
func (e *FileEvent) ignoreLinux() bool {
 | 
						|
	// Ignore anything the inotify API says to ignore
 | 
						|
	if e.mask&sys_IN_IGNORED == sys_IN_IGNORED {
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	// If the event is not a DELETE or RENAME, the file must exist.
 | 
						|
	// Otherwise the event is ignored.
 | 
						|
	// *Note*: this was put in place because it was seen that a MODIFY
 | 
						|
	// event was sent after the DELETE. This ignores that MODIFY and
 | 
						|
	// assumes a DELETE will come or has come if the file doesn't exist.
 | 
						|
	if !(e.IsDelete() || e.IsRename()) {
 | 
						|
		_, statErr := os.Lstat(e.Name)
 | 
						|
		return os.IsNotExist(statErr)
 | 
						|
	}
 | 
						|
	return false
 | 
						|
}
 |