Merge branch 'master' into watch

This commit is contained in:
Joey Hess 2012-06-05 20:30:37 -04:00
commit a7a729bce4
13 changed files with 93 additions and 63 deletions

View file

@ -6,6 +6,7 @@
-}
module Backend (
B.KeySource(..),
list,
orderedList,
genKey,
@ -51,18 +52,19 @@ orderedList = do
parseBackendList s = map lookupBackendName $ words s
{- Generates a key for a file, trying each backend in turn until one
- accepts it. -}
genKey :: FilePath -> Maybe Backend -> Annex (Maybe (Key, Backend))
genKey file trybackend = do
- accepts it.
-}
genKey :: B.KeySource -> Maybe Backend -> Annex (Maybe (Key, Backend))
genKey source trybackend = do
bs <- orderedList
let bs' = maybe bs (: bs) trybackend
genKey' bs' file
genKey' :: [Backend] -> FilePath -> Annex (Maybe (Key, Backend))
genKey' bs' source
genKey' :: [Backend] -> B.KeySource -> Annex (Maybe (Key, Backend))
genKey' [] _ = return Nothing
genKey' (b:bs) file = do
r <- B.getKey b file
genKey' (b:bs) source = do
r <- B.getKey b source
case r of
Nothing -> genKey' bs file
Nothing -> genKey' bs source
Just k -> return $ Just (makesane k, b)
where
-- keyNames should not contain newline characters.

View file

@ -69,9 +69,10 @@ shaN size file = do
command = fromJust $ shaCommand size
{- A key is a checksum of its contents. -}
keyValue :: SHASize -> FilePath -> Annex (Maybe Key)
keyValue size file = do
s <- shaN size file
keyValue :: SHASize -> KeySource -> Annex (Maybe Key)
keyValue size source = do
let file = contentLocation source
s <- shaN size file
stat <- liftIO $ getFileStatus file
return $ Just $ stubKey
{ keyName = s
@ -80,14 +81,14 @@ keyValue size file = do
}
{- Extension preserving keys. -}
keyValueE :: SHASize -> FilePath -> Annex (Maybe Key)
keyValueE size file = keyValue size file >>= maybe (return Nothing) addE
keyValueE :: SHASize -> KeySource -> Annex (Maybe Key)
keyValueE size source = keyValue size source >>= maybe (return Nothing) addE
where
addE k = return $ Just $ k
{ keyName = keyName k ++ extension
, keyBackendName = shaNameE size
}
naiveextension = takeExtension file
naiveextension = takeExtension $ keyFilename source
extension
-- long or newline containing extensions are
-- probably not really an extension

View file

@ -20,11 +20,11 @@ backends :: [Backend]
backends = [backend]
backend :: Backend
backend = Backend {
name = "URL",
getKey = const (return Nothing),
fsckKey = Nothing
}
backend = Backend
{ name = "URL"
, getKey = const $ return Nothing
, fsckKey = Nothing
}
fromUrl :: String -> Maybe Integer -> Key
fromUrl url size = stubKey

View file

@ -15,11 +15,11 @@ backends :: [Backend]
backends = [backend]
backend :: Backend
backend = Backend {
name = "WORM",
getKey = keyValue,
fsckKey = Nothing
}
backend = Backend
{ name = "WORM"
, getKey = keyValue
, fsckKey = Nothing
}
{- The key includes the file size, modification time, and the
- basename of the filename.
@ -28,11 +28,11 @@ backend = Backend {
- while also allowing a file to be moved around while retaining the
- same key.
-}
keyValue :: FilePath -> Annex (Maybe Key)
keyValue file = do
stat <- liftIO $ getFileStatus file
keyValue :: KeySource -> Annex (Maybe Key)
keyValue source = do
stat <- liftIO $ getFileStatus $ contentLocation source
return $ Just Key {
keyName = takeFileName file,
keyName = takeFileName $ keyFilename source,
keyBackendName = name backend,
keySize = Just $ fromIntegral $ fileSize stat,
keyMtime = Just $ modificationTime stat

View file

@ -12,10 +12,12 @@ import Annex.Exception
import Command
import qualified Annex
import qualified Annex.Queue
import qualified Backend
import Backend
import Logs.Location
import Annex.Content
import Annex.Perms
import Utility.Touch
import Utility.FileMode
def :: [Command]
def = [command "add" paramPaths seek "add files to annex"]
@ -44,22 +46,38 @@ start file = notBareRepo $ ifAnnexed file fixup add
liftIO $ removeFile file
next $ next $ cleanup file key =<< inAnnex key
{- The file that's being added is locked down before a key is generated,
- to prevent it from being modified in between. It's hard linked into a
- temporary location, and its writable bits are removed. It could still be
- written to by a process that already has it open for writing. -}
perform :: FilePath -> CommandPerform
perform file = do
backend <- Backend.chooseBackend file
Backend.genKey file backend >>= go
liftIO $ preventWrite file
tmp <- fromRepo gitAnnexTmpDir
createAnnexDirectory tmp
pid <- liftIO getProcessID
let tmpfile = tmp </> "add" ++ show pid ++ "." ++ takeFileName file
nuke tmpfile
liftIO $ createLink file tmpfile
let source = KeySource { keyFilename = file, contentLocation = tmpfile }
backend <- chooseBackend file
genKey source backend >>= go tmpfile
where
go Nothing = stop
go (Just (key, _)) = do
handle (undo file key) $ moveAnnex key file
go _ Nothing = stop
go tmpfile (Just (key, _)) = do
handle (undo file key) $ moveAnnex key tmpfile
nuke file
next $ cleanup file key True
nuke :: FilePath -> Annex ()
nuke file = liftIO $ whenM (doesFileExist file) $ removeFile file
{- On error, put the file back so it doesn't seem to have vanished.
- This can be called before or after the symlink is in place. -}
undo :: FilePath -> Key -> IOException -> Annex a
undo file key e = do
whenM (inAnnex key) $ do
liftIO $ whenM (doesFileExist file) $ removeFile file
nuke file
handle tryharder $ fromAnnex key file
logStatus key InfoMissing
throw e

View file

@ -11,7 +11,7 @@ import Network.URI
import Common.Annex
import Command
import qualified Backend
import Backend
import qualified Command.Add
import qualified Annex
import qualified Backend.URL
@ -72,8 +72,9 @@ download url file = do
tmp <- fromRepo $ gitAnnexTmpLocation dummykey
liftIO $ createDirectoryIfMissing True (parentDir tmp)
stopUnless (downloadUrl [url] tmp) $ do
backend <- Backend.chooseBackend file
k <- Backend.genKey tmp backend
backend <- chooseBackend file
let source = KeySource { keyFilename = file, contentLocation = file}
k <- genKey source backend
case k of
Nothing -> stop
Just (key, _) -> do

View file

@ -16,6 +16,7 @@ import qualified Types.Backend
import qualified Types.Key
import qualified Backend
import Annex.Content
import Annex.Perms
import Logs.Location
import Logs.Trust
import Annex.UUID
@ -83,8 +84,8 @@ performRemote key file backend numcopies remote =
withtmp a = do
pid <- liftIO getProcessID
t <- fromRepo gitAnnexTmpDir
createAnnexDirectory t
let tmp = t </> "fsck" ++ show pid ++ "." ++ keyFile key
liftIO $ createDirectoryIfMissing True t
let cleanup = liftIO $ catchIO (removeFile tmp) (const noop)
cleanup
cleanup `after` a tmp

View file

@ -9,7 +9,7 @@ module Command.Migrate where
import Common.Annex
import Command
import qualified Backend
import Backend
import qualified Types.Key
import Annex.Content
import qualified Command.ReKey
@ -23,14 +23,14 @@ seek = [withFilesInGit $ whenAnnexed start]
start :: FilePath -> (Key, Backend) -> CommandStart
start file (key, oldbackend) = do
exists <- inAnnex key
newbackend <- choosebackend =<< Backend.chooseBackend file
newbackend <- choosebackend =<< chooseBackend file
if (newbackend /= oldbackend || upgradableKey key) && exists
then do
showStart "migrate" file
next $ perform file key newbackend
else stop
where
choosebackend Nothing = Prelude.head <$> Backend.orderedList
choosebackend Nothing = Prelude.head <$> orderedList
choosebackend (Just backend) = return backend
{- Checks if a key is upgradable to a newer representation. -}
@ -40,25 +40,13 @@ upgradableKey key = isNothing $ Types.Key.keySize key
{- Store the old backend's key in the new backend
- The old backend's key is not dropped from it, because there may
- be other files still pointing at that key.
-
- Use the same filename as the file for the temp file name, to support
- backends that allow the filename to influence the keys they
- generate.
-}
- be other files still pointing at that key. -}
perform :: FilePath -> Key -> Backend -> CommandPerform
perform file oldkey newbackend = maybe stop go =<< genkey
where
go newkey = stopUnless (Command.ReKey.linkKey oldkey newkey) $
next $ Command.ReKey.cleanup file oldkey newkey
genkey = do
src <- inRepo $ gitAnnexLocation oldkey
tmp <- fromRepo gitAnnexTmpDir
let tmpfile = tmp </> takeFileName file
cleantmp tmpfile
liftIO $ createLink src tmpfile
newkey <- liftM fst <$>
Backend.genKey tmpfile (Just newbackend)
cleantmp tmpfile
return newkey
cleantmp t = liftIO $ whenM (doesFileExist t) $ removeFile t
content <- inRepo $ gitAnnexLocation oldkey
let source = KeySource { keyFilename = file, contentLocation = content }
liftM fst <$> genKey source (Just newbackend)

View file

@ -19,6 +19,7 @@ import Remote.Helper.Special
import Remote.Helper.Encryptable
import Crypto
import Utility.RsyncFile
import Annex.Perms
type RsyncUrl = String
@ -176,6 +177,7 @@ withRsyncScratchDir :: (FilePath -> Annex Bool) -> Annex Bool
withRsyncScratchDir a = do
pid <- liftIO getProcessID
t <- fromRepo gitAnnexTmpDir
createAnnexDirectory t
let tmp = t </> "rsynctmp" </> show pid
nuke tmp
liftIO $ createDirectoryIfMissing True tmp

View file

@ -2,7 +2,7 @@
-
- Most things should not need this, using Types instead
-
- Copyright 2010 Joey Hess <joey@kitenet.net>
- Copyright 2010,2012 Joey Hess <joey@kitenet.net>
-
- Licensed under the GNU GPL version 3 or higher.
-}
@ -11,11 +11,18 @@ module Types.Backend where
import Types.Key
{- The source used to generate a key. The location of the content
- may be different from the filename associated with the key. -}
data KeySource = KeySource
{ keyFilename :: FilePath
, contentLocation :: FilePath
}
data BackendA a = Backend {
-- name of this backend
name :: String,
-- converts a filename to a key
getKey :: FilePath -> a (Maybe Key),
-- gets the key to use for a given content
getKey :: KeySource -> a (Maybe Key),
-- called during fsck to check a key, if the backend has its own checks
fsckKey :: Maybe (Key -> FilePath -> a Bool)
}

7
debian/changelog vendored
View file

@ -1,3 +1,10 @@
git-annex (3.20120606) UNRELEASED; urgency=low
* add: Prevent (most) modifications from being made to a file while it
is being added to the annex.
-- Joey Hess <joeyh@debian.org> Tue, 05 Jun 2012 20:25:51 -0400
git-annex (3.20120605) unstable; urgency=low
* sync: Show a nicer message if a user tries to sync to a special remote.

View file

@ -61,7 +61,9 @@ Many races need to be dealt with by this code. Here are some of them.
**Currently unfixed**; The new content will be moved to the annex under the
old checksum, and fsck will later catch this inconsistency.
Possible fix: Move content someplace before doing checksumming.
Possible fix: Move content someplace before doing checksumming. Perhaps
using a hard link and removing the write bit to prevent modification
while checksumming.
* File is added and then replaced with another file before the annex add
makes its symlink.

View file

@ -171,7 +171,8 @@ test_reinject :: Test
test_reinject = "git-annex reinject/fromkey" ~: TestCase $ intmpclonerepo $ do
git_annex "drop" ["--force", sha1annexedfile] @? "drop failed"
writeFile tmp $ content sha1annexedfile
r <- annexeval $ Types.Backend.getKey backendSHA1 tmp
r <- annexeval $ Types.Backend.getKey backendSHA1 $
Types.Backend.KeySource { Types.Backend.keyFilename = tmp, Types.Backend.contentLocation = tmp }
let key = show $ fromJust r
git_annex "reinject" [tmp, sha1annexedfile] @? "reinject failed"
git_annex "fromkey" [key, sha1annexedfiledup] @? "fromkey failed"