1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
|
// Copyright (c) 2014-2015 The Notify Authors. All rights reserved.
// Use of this source code is governed by the MIT license that can be
// found in the LICENSE file.
// +build solaris
package notify
import (
"fmt"
"os"
"syscall"
)
// newTrigger returns implementation of trigger.
func newTrigger(pthLkp map[string]*watched) trigger {
return &fen{
pthLkp: pthLkp,
cf: newCfen(),
}
}
// fen is a structure implementing trigger for FEN.
type fen struct {
// p is a FEN port identifier
p int
// pthLkp is a structure mapping monitored files/dir with data about them,
// shared with parent trg structure
pthLkp map[string]*watched
// cf wraps C operations for FEN
cf cfen
}
// watched is a data structure representing watched file/directory.
type watched struct {
// p is a path to watched file/directory
p string
// fi provides information about watched file/dir
fi os.FileInfo
// eDir represents events watched directly
eDir Event
// eNonDir represents events watched indirectly
eNonDir Event
}
// Stop implements trigger.
func (f *fen) Stop() error {
return f.cf.port_alert(f.p)
}
// Close implements trigger.
func (f *fen) Close() (err error) {
return syscall.Close(f.p)
}
// NewWatched implements trigger.
func (*fen) NewWatched(p string, fi os.FileInfo) (*watched, error) {
return &watched{p: p, fi: fi}, nil
}
// Record implements trigger.
func (f *fen) Record(w *watched) {
f.pthLkp[w.p] = w
}
// Del implements trigger.
func (f *fen) Del(w *watched) {
delete(f.pthLkp, w.p)
}
func inter2pe(n interface{}) PortEvent {
pe, ok := n.(PortEvent)
if !ok {
panic(fmt.Sprintf("fen: type should be PortEvent, %T instead", n))
}
return pe
}
// Watched implements trigger.
func (f *fen) Watched(n interface{}) (*watched, int64, error) {
pe := inter2pe(n)
fo, ok := pe.PortevObject.(*FileObj)
if !ok || fo == nil {
panic(fmt.Sprintf("fen: type should be *FileObj, %T instead", fo))
}
w, ok := f.pthLkp[fo.Name]
if !ok {
return nil, 0, errNotWatched
}
return w, int64(pe.PortevEvents), nil
}
// init initializes FEN.
func (f *fen) Init() (err error) {
f.p, err = f.cf.port_create()
return
}
func fi2fo(fi os.FileInfo, p string) FileObj {
st, ok := fi.Sys().(*syscall.Stat_t)
if !ok {
panic(fmt.Sprintf("fen: type should be *syscall.Stat_t, %T instead", st))
}
return FileObj{Name: p, Atim: st.Atim, Mtim: st.Mtim, Ctim: st.Ctim}
}
// Unwatch implements trigger.
func (f *fen) Unwatch(w *watched) error {
return f.cf.port_dissociate(f.p, FileObj{Name: w.p})
}
// Watch implements trigger.
func (f *fen) Watch(fi os.FileInfo, w *watched, e int64) error {
return f.cf.port_associate(f.p, fi2fo(fi, w.p), int(e))
}
// Wait implements trigger.
func (f *fen) Wait() (interface{}, error) {
var (
pe PortEvent
err error
)
err = f.cf.port_get(f.p, &pe)
return pe, err
}
// IsStop implements trigger.
func (f *fen) IsStop(n interface{}, err error) bool {
return err == syscall.EBADF || inter2pe(n).PortevSource == srcAlert
}
func init() {
encode = func(e Event) (o int64) {
// Create event is not supported by FEN. Instead FileModified event will
// be registered. If this event will be reported on dir which is to be
// monitored for Create, dir will be rescanned and Create events will
// be generated and returned for new files. In case of files,
// if not requested FileModified event is reported, it will be ignored.
if e&Create != 0 {
o = (o &^ int64(Create)) | int64(FileModified)
}
if e&Write != 0 {
o = (o &^ int64(Write)) | int64(FileModified)
}
// Following events are 'exception events' and as such cannot be requested
// explicitly for monitoring or filtered out. If the will be reported
// by FEN and not subscribed with by user, they will be filtered out by
// watcher's logic.
o &= int64(^Rename & ^Remove &^ FileDelete &^ FileRenameTo &^
FileRenameFrom &^ Unmounted &^ MountedOver)
return
}
nat2not = map[Event]Event{
FileModified: Write,
FileRenameFrom: Rename,
FileDelete: Remove,
FileAccess: Event(0),
FileAttrib: Event(0),
FileRenameTo: Event(0),
FileTrunc: Event(0),
FileNoFollow: Event(0),
Unmounted: Event(0),
MountedOver: Event(0),
}
not2nat = map[Event]Event{
Write: FileModified,
Rename: FileRenameFrom,
Remove: FileDelete,
}
}
|