4 from collections import deque
7 from twisted.internet import defer, reactor, task
8 from twisted.python.failure import Failure
9 from twisted.python import runtime
10 from twisted.application import service
12 from allmydata.util import fileutil
13 from allmydata.interfaces import IDirectoryNode
14 from allmydata.util import log
15 from allmydata.util.fileutil import precondition_abspath, get_pathinfo, ConflictError
16 from allmydata.util.assertutil import precondition, _assert
17 from allmydata.util.deferredutil import HookMixin
18 from allmydata.util.encodingutil import listdir_filepath, to_filepath, \
19 extend_filepath, unicode_from_filepath, unicode_segments_from, \
20 quote_filepath, quote_local_unicode_path, quote_output, FilenameEncodingError
21 from allmydata.immutable.upload import FileName, Data
22 from allmydata import magicfolderdb, magicpath
24 defer.setDebugging(True)
25 IN_EXCL_UNLINK = 0x04000000L
27 def get_inotify_module():
29 if sys.platform == "win32":
30 from allmydata.windows import inotify
31 elif runtime.platform.supportsINotify():
32 from twisted.internet import inotify
34 raise NotImplementedError("filesystem notification needed for Magic Folder is not supported.\n"
35 "This currently requires Linux or Windows.")
37 except (ImportError, AttributeError) as e:
39 if sys.platform == "win32":
40 raise NotImplementedError("filesystem notification needed for Magic Folder is not supported.\n"
41 "Windows support requires at least Vista, and has only been tested on Windows 7.")
45 def is_new_file(pathinfo, db_entry):
49 if not pathinfo.exists and db_entry.size is None:
52 return ((pathinfo.size, pathinfo.ctime, pathinfo.mtime) !=
53 (db_entry.size, db_entry.ctime, db_entry.mtime))
56 class MagicFolder(service.MultiService):
59 def __init__(self, client, upload_dircap, collective_dircap, local_path_u, dbfile, umask,
60 pending_delay=1.0, clock=None):
61 precondition_abspath(local_path_u)
63 service.MultiService.__init__(self)
65 immediate = clock is not None
66 clock = clock or reactor
67 db = magicfolderdb.get_magicfolderdb(dbfile, create_version=(magicfolderdb.SCHEMA_v1, 1))
69 return Failure(Exception('ERROR: Unable to load magic folder db.'))
75 upload_dirnode = self._client.create_node_from_uri(upload_dircap)
76 collective_dirnode = self._client.create_node_from_uri(collective_dircap)
78 self.uploader = Uploader(client, local_path_u, db, upload_dirnode, pending_delay, clock, immediate)
79 self.downloader = Downloader(client, local_path_u, db, collective_dirnode,
80 upload_dirnode.get_readonly_uri(), clock, self.uploader.is_pending, umask)
82 def startService(self):
83 # TODO: why is this being called more than once?
85 return defer.succeed(None)
86 print "%r.startService" % (self,)
87 service.MultiService.startService(self)
88 return self.uploader.start_monitoring()
91 """ready is used to signal us to start
92 processing the upload and download items...
94 self.uploader.start_uploading() # synchronous
95 return self.downloader.start_downloading()
99 d = self.uploader.stop()
100 d2 = self.downloader.stop()
101 d.addCallback(lambda ign: d2)
104 def remove_service(self):
105 return service.MultiService.disownServiceParent(self)
108 class QueueMixin(HookMixin):
109 def __init__(self, client, local_path_u, db, name, clock):
110 self._client = client
111 self._local_path_u = local_path_u
112 self._local_filepath = to_filepath(local_path_u)
116 self._hooks = {'processed': None, 'started': None}
117 self.started_d = self.set_hook('started')
119 if not self._local_filepath.exists():
120 raise AssertionError("The '[magic_folder] local.directory' parameter was %s "
121 "but there is no directory at that location."
122 % quote_local_unicode_path(self._local_path_u))
123 if not self._local_filepath.isdir():
124 raise AssertionError("The '[magic_folder] local.directory' parameter was %s "
125 "but the thing at that location is not a directory."
126 % quote_local_unicode_path(self._local_path_u))
128 self._deque = deque()
129 self._lazy_tail = defer.succeed(None)
130 self._stopped = False
133 def _get_filepath(self, relpath_u):
134 self._log("_get_filepath(%r)" % (relpath_u,))
135 return extend_filepath(self._local_filepath, relpath_u.split(u"/"))
137 def _get_relpath(self, filepath):
138 self._log("_get_relpath(%r)" % (filepath,))
139 segments = unicode_segments_from(filepath, self._local_filepath)
140 self._log("segments = %r" % (segments,))
141 return u"/".join(segments)
143 def _count(self, counter_name, delta=1):
144 ctr = 'magic_folder.%s.%s' % (self._name, counter_name)
145 self._log("%s += %r" % (counter_name, delta))
146 self._client.stats_provider.count(ctr, delta)
148 def _logcb(self, res, msg):
149 self._log("%s: %r" % (msg, res))
153 s = "Magic Folder %s %s: %s" % (quote_output(self._client.nickname), self._name, msg)
156 #open("events", "ab+").write(msg)
158 def _turn_deque(self):
160 self._log("_turn_deque")
165 item = self._deque.pop()
166 self._log("popped %r" % (item,))
167 self._count('objects_queued', -1)
169 self._log("deque is now empty")
170 self._lazy_tail.addBoth(self._logcb, "whawhat empty")
171 self._lazy_tail.addCallback(lambda ign: self._when_queue_is_empty())
172 self._lazy_tail.addBoth(self._logcb, "got past _when_queue_is_empty")
174 self._log("_turn_deque else clause")
175 self._lazy_tail.addBoth(self._logcb, "whawhat else %r" % (item,))
176 self._lazy_tail.addCallback(lambda ign: self._process(item))
177 self._lazy_tail.addBoth(self._logcb, "got past _process")
178 self._lazy_tail.addBoth(self._call_hook, 'processed', async=True)
179 self._lazy_tail.addBoth(self._logcb, "got past _call_hook (turn_delay = %r)" % (self._turn_delay,))
180 self._lazy_tail.addCallback(lambda ign: task.deferLater(self._clock, self._turn_delay, self._turn_deque))
181 self._lazy_tail.addBoth(self._logcb, "got past deferLater")
182 except Exception as e:
183 self._log("---- turn deque exception %s" % (e,))
187 class Uploader(QueueMixin):
188 def __init__(self, client, local_path_u, db, upload_dirnode, pending_delay, clock,
190 QueueMixin.__init__(self, client, local_path_u, db, 'uploader', clock)
192 self.is_ready = False
193 self._immediate = immediate
195 if not IDirectoryNode.providedBy(upload_dirnode):
196 raise AssertionError("The URI in '%s' does not refer to a directory."
197 % os.path.join('private', 'magic_folder_dircap'))
198 if upload_dirnode.is_unknown() or upload_dirnode.is_readonly():
199 raise AssertionError("The URI in '%s' is not a writecap to a directory."
200 % os.path.join('private', 'magic_folder_dircap'))
202 self._upload_dirnode = upload_dirnode
203 self._inotify = get_inotify_module()
204 self._notifier = self._inotify.INotify()
205 self._pending = set() # of unicode relpaths
207 self._periodic_full_scan_duration = 10 * 60 # perform a full scan every 10 minutes
209 if hasattr(self._notifier, 'set_pending_delay'):
210 self._notifier.set_pending_delay(pending_delay)
212 # TODO: what about IN_MOVE_SELF and IN_UNMOUNT?
214 self.mask = ( self._inotify.IN_CREATE
215 | self._inotify.IN_CLOSE_WRITE
216 | self._inotify.IN_MOVED_TO
217 | self._inotify.IN_MOVED_FROM
218 | self._inotify.IN_DELETE
219 | self._inotify.IN_ONLYDIR
222 self._notifier.watch(self._local_filepath, mask=self.mask, callbacks=[self._notify],
225 def start_monitoring(self):
226 self._log("start_monitoring")
227 d = defer.succeed(None)
228 d.addCallback(lambda ign: self._notifier.startReading())
229 d.addCallback(lambda ign: self._count('dirs_monitored'))
230 d.addBoth(self._call_hook, 'started')
235 self._notifier.stopReading()
236 self._count('dirs_monitored', -1)
237 self.periodic_callid.cancel()
238 if hasattr(self._notifier, 'wait_until_stopped'):
239 d = self._notifier.wait_until_stopped()
241 d = defer.succeed(None)
242 d.addCallback(lambda ign: self._lazy_tail)
245 def start_uploading(self):
246 self._log("start_uploading")
249 all_relpaths = self._db.get_all_relpaths()
250 self._log("all relpaths: %r" % (all_relpaths,))
252 for relpath_u in all_relpaths:
253 self._add_pending(relpath_u)
257 def _extend_queue_and_keep_going(self, relpaths_u):
258 self._log("_extend_queue_and_keep_going %r" % (relpaths_u,))
259 self._deque.extend(relpaths_u)
260 self._count('objects_queued', len(relpaths_u))
263 if self._immediate: # for tests
266 self._clock.callLater(0, self._turn_deque)
268 def _full_scan(self):
269 self.periodic_callid = self._clock.callLater(self._periodic_full_scan_duration, self._full_scan)
271 self._log("_pending %r" % (self._pending))
273 self._extend_queue_and_keep_going(self._pending)
275 def _add_pending(self, relpath_u):
276 self._log("add pending %r" % (relpath_u,))
277 if not magicpath.should_ignore_file(relpath_u):
278 self._pending.add(relpath_u)
280 def _scan(self, reldir_u):
281 # Scan a directory by (synchronously) adding the paths of all its children to self._pending.
282 # Note that this doesn't add them to the deque -- that will
284 self._log("scan %r" % (reldir_u,))
285 fp = self._get_filepath(reldir_u)
287 children = listdir_filepath(fp)
288 except EnvironmentError:
289 raise Exception("WARNING: magic folder: permission denied on directory %s"
290 % quote_filepath(fp))
291 except FilenameEncodingError:
292 raise Exception("WARNING: magic folder: could not list directory %s due to a filename encoding error"
293 % quote_filepath(fp))
295 for child in children:
296 _assert(isinstance(child, unicode), child=child)
297 self._add_pending("%s/%s" % (reldir_u, child) if reldir_u != u"" else child)
299 def is_pending(self, relpath_u):
300 return relpath_u in self._pending
302 def _notify(self, opaque, path, events_mask):
303 self._log("inotify event %r, %r, %r\n" % (opaque, path, ', '.join(self._inotify.humanReadableMask(events_mask))))
304 relpath_u = self._get_relpath(path)
306 # We filter out IN_CREATE events not associated with a directory.
307 # Acting on IN_CREATE for files could cause us to read and upload
308 # a possibly-incomplete file before the application has closed it.
309 # There should always be an IN_CLOSE_WRITE after an IN_CREATE, I think.
310 # It isn't possible to avoid watching for IN_CREATE at all, because
311 # it is the only event notified for a directory creation.
313 if ((events_mask & self._inotify.IN_CREATE) != 0 and
314 (events_mask & self._inotify.IN_ISDIR) == 0):
315 self._log("ignoring event for %r (creation of non-directory)\n" % (relpath_u,))
317 if relpath_u in self._pending:
318 self._log("not queueing %r because it is already pending" % (relpath_u,))
320 if magicpath.should_ignore_file(relpath_u):
321 self._log("ignoring event for %r (ignorable path)" % (relpath_u,))
324 self._pending.add(relpath_u)
325 self._extend_queue_and_keep_going([relpath_u])
327 def _when_queue_is_empty(self):
328 return defer.succeed(None)
330 def _process(self, relpath_u):
332 self._log("_process(%r)" % (relpath_u,))
333 if relpath_u is None:
335 precondition(isinstance(relpath_u, unicode), relpath_u)
336 precondition(not relpath_u.endswith(u'/'), relpath_u)
338 d = defer.succeed(None)
340 def _maybe_upload(ign, now=None):
341 self._log("_maybe_upload: relpath_u=%r, now=%r" % (relpath_u, now))
344 fp = self._get_filepath(relpath_u)
345 pathinfo = get_pathinfo(unicode_from_filepath(fp))
347 self._log("about to remove %r from pending set %r" %
348 (relpath_u, self._pending))
349 self._pending.remove(relpath_u)
350 encoded_path_u = magicpath.path2magic(relpath_u)
352 if not pathinfo.exists:
353 # FIXME merge this with the 'isfile' case.
354 self._log("notified object %s disappeared (this is normal)" % quote_filepath(fp))
355 self._count('objects_disappeared')
357 db_entry = self._db.get_db_entry(relpath_u)
361 last_downloaded_timestamp = now # is this correct?
363 if is_new_file(pathinfo, db_entry):
364 new_version = db_entry.version + 1
366 self._log("Not uploading %r" % (relpath_u,))
367 self._count('objects_not_uploaded')
370 metadata = { 'version': new_version,
372 'last_downloaded_timestamp': last_downloaded_timestamp }
373 if db_entry.last_downloaded_uri is not None:
374 metadata['last_downloaded_uri'] = db_entry.last_downloaded_uri
376 empty_uploadable = Data("", self._client.convergence)
377 d2 = self._upload_dirnode.add_file(encoded_path_u, empty_uploadable,
378 metadata=metadata, overwrite=True)
380 def _add_db_entry(filenode):
381 filecap = filenode.get_uri()
382 last_downloaded_uri = metadata.get('last_downloaded_uri', None)
383 self._db.did_upload_version(relpath_u, new_version, filecap,
384 last_downloaded_uri, last_downloaded_timestamp,
386 self._count('files_uploaded')
387 d2.addCallback(_add_db_entry)
389 elif pathinfo.islink:
390 self.warn("WARNING: cannot upload symlink %s" % quote_filepath(fp))
394 if not getattr(self._notifier, 'recursive_includes_new_subdirectories', False):
395 self._notifier.watch(fp, mask=self.mask, callbacks=[self._notify], recursive=True)
397 uploadable = Data("", self._client.convergence)
398 encoded_path_u += magicpath.path2magic(u"/")
399 self._log("encoded_path_u = %r" % (encoded_path_u,))
400 upload_d = self._upload_dirnode.add_file(encoded_path_u, uploadable, metadata={"version":0}, overwrite=True)
401 def _dir_succeeded(ign):
402 self._log("created subdirectory %r" % (relpath_u,))
403 self._count('directories_created')
405 self._log("failed to create subdirectory %r" % (relpath_u,))
407 upload_d.addCallbacks(_dir_succeeded, _dir_failed)
408 upload_d.addCallback(lambda ign: self._scan(relpath_u))
409 upload_d.addCallback(lambda ign: self._extend_queue_and_keep_going(self._pending))
411 elif pathinfo.isfile:
412 db_entry = self._db.get_db_entry(relpath_u)
414 last_downloaded_timestamp = now
418 elif is_new_file(pathinfo, db_entry):
419 new_version = db_entry.version + 1
421 self._log("Not uploading %r" % (relpath_u,))
422 self._count('objects_not_uploaded')
425 metadata = { 'version': new_version,
426 'last_downloaded_timestamp': last_downloaded_timestamp }
427 if db_entry is not None and db_entry.last_downloaded_uri is not None:
428 metadata['last_downloaded_uri'] = db_entry.last_downloaded_uri
430 uploadable = FileName(unicode_from_filepath(fp), self._client.convergence)
431 d2 = self._upload_dirnode.add_file(encoded_path_u, uploadable,
432 metadata=metadata, overwrite=True)
434 def _add_db_entry(filenode):
435 filecap = filenode.get_uri()
436 last_downloaded_uri = metadata.get('last_downloaded_uri', None)
437 self._db.did_upload_version(relpath_u, new_version, filecap,
438 last_downloaded_uri, last_downloaded_timestamp,
440 self._count('files_uploaded')
441 d2.addCallback(_add_db_entry)
444 self.warn("WARNING: cannot process special file %s" % quote_filepath(fp))
447 d.addCallback(_maybe_upload)
450 self._count('objects_succeeded')
453 self._count('objects_failed')
454 self._log("%s while processing %r" % (f, relpath_u))
456 d.addCallbacks(_succeeded, _failed)
459 def _get_metadata(self, encoded_path_u):
461 d = self._upload_dirnode.get_metadata_for(encoded_path_u)
466 def _get_filenode(self, encoded_path_u):
468 d = self._upload_dirnode.get(encoded_path_u)
474 class WriteFileMixin(object):
477 def _get_conflicted_filename(self, abspath_u):
478 return abspath_u + u".conflict"
480 def _write_downloaded_file(self, abspath_u, file_contents, is_conflict=False, now=None):
481 self._log("_write_downloaded_file(%r, <%d bytes>, is_conflict=%r, now=%r)"
482 % (abspath_u, len(file_contents), is_conflict, now))
484 # 1. Write a temporary file, say .foo.tmp.
485 # 2. is_conflict determines whether this is an overwrite or a conflict.
486 # 3. Set the mtime of the replacement file to be T seconds before the
487 # current local time.
488 # 4. Perform a file replacement with backup filename foo.backup,
489 # replaced file foo, and replacement file .foo.tmp. If any step of
490 # this operation fails, reclassify as a conflict and stop.
492 # Returns the path of the destination file.
494 precondition_abspath(abspath_u)
495 replacement_path_u = abspath_u + u".tmp" # FIXME more unique
496 backup_path_u = abspath_u + u".backup"
500 # ensure parent directory exists
501 head, tail = os.path.split(abspath_u)
503 old_mask = os.umask(self._umask)
505 fileutil.make_dirs(head, (~ self._umask) & 0777)
506 fileutil.write(replacement_path_u, file_contents)
510 os.utime(replacement_path_u, (now, now - self.FUDGE_SECONDS))
512 print "0x00 ------------ <><> is conflict; calling _rename_conflicted_file... %r %r" % (abspath_u, replacement_path_u)
513 return self._rename_conflicted_file(abspath_u, replacement_path_u)
516 fileutil.replace_file(abspath_u, replacement_path_u, backup_path_u)
518 except fileutil.ConflictError:
519 return self._rename_conflicted_file(abspath_u, replacement_path_u)
521 def _rename_conflicted_file(self, abspath_u, replacement_path_u):
522 self._log("_rename_conflicted_file(%r, %r)" % (abspath_u, replacement_path_u))
524 conflict_path_u = self._get_conflicted_filename(abspath_u)
525 print "XXX rename %r %r" % (replacement_path_u, conflict_path_u)
526 if os.path.isfile(replacement_path_u):
527 print "%r exists" % (replacement_path_u,)
528 if os.path.isfile(conflict_path_u):
529 print "%r exists" % (conflict_path_u,)
531 fileutil.rename_no_overwrite(replacement_path_u, conflict_path_u)
532 return conflict_path_u
534 def _rename_deleted_file(self, abspath_u):
535 self._log('renaming deleted file to backup: %s' % (abspath_u,))
537 fileutil.rename_no_overwrite(abspath_u, abspath_u + u'.backup')
539 self._log("Already gone: '%s'" % (abspath_u,))
543 class Downloader(QueueMixin, WriteFileMixin):
544 REMOTE_SCAN_INTERVAL = 3 # facilitates tests
546 def __init__(self, client, local_path_u, db, collective_dirnode,
547 upload_readonly_dircap, clock, is_upload_pending, umask):
548 QueueMixin.__init__(self, client, local_path_u, db, 'downloader', clock)
550 if not IDirectoryNode.providedBy(collective_dirnode):
551 raise AssertionError("The URI in '%s' does not refer to a directory."
552 % os.path.join('private', 'collective_dircap'))
553 if collective_dirnode.is_unknown() or not collective_dirnode.is_readonly():
554 raise AssertionError("The URI in '%s' is not a readonly cap to a directory."
555 % os.path.join('private', 'collective_dircap'))
557 self._collective_dirnode = collective_dirnode
558 self._upload_readonly_dircap = upload_readonly_dircap
559 self._is_upload_pending = is_upload_pending
562 def start_downloading(self):
563 self._log("start_downloading")
564 files = self._db.get_all_relpaths()
565 self._log("all files %s" % files)
567 d = self._scan_remote_collective(scan_self=True)
568 d.addBoth(self._logcb, "after _scan_remote_collective 0")
575 d = defer.succeed(None)
576 d.addCallback(lambda ign: self._lazy_tail)
579 def _should_download(self, relpath_u, remote_version):
581 _should_download returns a bool indicating whether or not a remote object should be downloaded.
582 We check the remote metadata version against our magic-folder db version number;
585 self._log("_should_download(%r, %r)" % (relpath_u, remote_version))
586 if magicpath.should_ignore_file(relpath_u):
590 db_entry = self._db.get_db_entry(relpath_u)
593 self._log("version %r" % (db_entry.version,))
594 return (db_entry.version < remote_version)
596 def _get_local_latest(self, relpath_u):
598 _get_local_latest takes a unicode path string checks to see if this file object
599 exists in our magic-folder db; if not then return None
600 else check for an entry in our magic-folder db and return the version number.
602 if not self._get_filepath(relpath_u).exists():
604 db_entry = self._db.get_db_entry(relpath_u)
605 return None if db_entry is None else db_entry.version
607 def _get_collective_latest_file(self, filename):
609 _get_collective_latest_file takes a file path pointing to a file managed by
610 magic-folder and returns a deferred that fires with the two tuple containing a
611 file node and metadata for the latest version of the file located in the
612 magic-folder collective directory.
614 collective_dirmap_d = self._collective_dirnode.list()
615 def scan_collective(result):
616 list_of_deferreds = []
617 for dir_name in result.keys():
618 # XXX make sure it's a directory
619 d = defer.succeed(None)
620 d.addCallback(lambda x, dir_name=dir_name: result[dir_name][0].get_child_and_metadata(filename))
621 list_of_deferreds.append(d)
622 deferList = defer.DeferredList(list_of_deferreds, consumeErrors=True)
624 collective_dirmap_d.addCallback(scan_collective)
625 def highest_version(deferredList):
629 for success, result in deferredList:
631 if result[1]['version'] > max_version:
632 node, metadata = result
633 max_version = result[1]['version']
634 return node, metadata
635 collective_dirmap_d.addCallback(highest_version)
636 return collective_dirmap_d
638 def _scan_remote_dmd(self, nickname, dirnode, scan_batch):
639 self._log("_scan_remote_dmd nickname %r" % (nickname,))
641 def scan_listing(listing_map):
642 for encoded_relpath_u in listing_map.keys():
643 relpath_u = magicpath.magic2path(encoded_relpath_u)
644 self._log("found %r" % (relpath_u,))
646 file_node, metadata = listing_map[encoded_relpath_u]
647 local_version = self._get_local_latest(relpath_u)
648 remote_version = metadata.get('version', None)
649 self._log("%r has local version %r, remote version %r" % (relpath_u, local_version, remote_version))
651 if local_version is None or remote_version is None or local_version < remote_version:
652 self._log("%r added to download queue" % (relpath_u,))
653 if scan_batch.has_key(relpath_u):
654 scan_batch[relpath_u] += [(file_node, metadata)]
656 scan_batch[relpath_u] = [(file_node, metadata)]
658 d.addCallback(scan_listing)
659 d.addBoth(self._logcb, "end of _scan_remote_dmd")
662 def _scan_remote_collective(self, scan_self=False):
663 self._log("_scan_remote_collective")
664 scan_batch = {} # path -> [(filenode, metadata)]
666 d = self._collective_dirnode.list()
667 def scan_collective(dirmap):
668 d2 = defer.succeed(None)
669 for dir_name in dirmap:
670 (dirnode, metadata) = dirmap[dir_name]
671 if scan_self or dirnode.get_readonly_uri() != self._upload_readonly_dircap:
672 d2.addCallback(lambda ign, dir_name=dir_name, dirnode=dirnode:
673 self._scan_remote_dmd(dir_name, dirnode, scan_batch))
674 def _err(f, dir_name=dir_name):
675 self._log("failed to scan DMD for client %r: %s" % (dir_name, f))
676 # XXX what should we do to make this failure more visible to users?
680 d.addCallback(scan_collective)
682 def _filter_batch_to_deque(ign):
683 self._log("deque = %r, scan_batch = %r" % (self._deque, scan_batch))
684 for relpath_u in scan_batch.keys():
685 file_node, metadata = max(scan_batch[relpath_u], key=lambda x: x[1]['version'])
687 if self._should_download(relpath_u, metadata['version']):
688 self._deque.append( (relpath_u, file_node, metadata) )
690 self._log("Excluding %r" % (relpath_u,))
691 self._call_hook(None, 'processed', async=True)
693 self._log("deque after = %r" % (self._deque,))
694 d.addCallback(_filter_batch_to_deque)
697 def _when_queue_is_empty(self):
698 d = task.deferLater(self._clock, self.REMOTE_SCAN_INTERVAL, self._scan_remote_collective)
699 d.addBoth(self._logcb, "after _scan_remote_collective 1")
700 d.addCallback(lambda ign: self._turn_deque())
703 def _process(self, item, now=None):
705 self._log("_process(%r)" % (item,))
708 (relpath_u, file_node, metadata) = item
709 fp = self._get_filepath(relpath_u)
710 abspath_u = unicode_from_filepath(fp)
711 conflict_path_u = self._get_conflicted_filename(abspath_u)
713 d = defer.succeed(None)
715 def do_update_db(written_abspath_u):
716 filecap = file_node.get_uri()
717 last_uploaded_uri = metadata.get('last_uploaded_uri', None)
718 last_downloaded_uri = filecap
719 last_downloaded_timestamp = now
720 written_pathinfo = get_pathinfo(written_abspath_u)
722 if not written_pathinfo.exists and not metadata.get('deleted', False):
723 raise Exception("downloaded object %s disappeared" % quote_local_unicode_path(written_abspath_u))
725 self._db.did_upload_version(relpath_u, metadata['version'], last_uploaded_uri,
726 last_downloaded_uri, last_downloaded_timestamp, written_pathinfo)
727 self._count('objects_downloaded')
729 self._log("download failed: %s" % (str(f),))
730 self._count('objects_failed')
733 if os.path.isfile(conflict_path_u):
735 raise ConflictError("download failed: already conflicted: %r" % (relpath_u,))
739 db_entry = self._db.get_db_entry(relpath_u)
740 dmd_last_downloaded_uri = metadata.get('last_downloaded_uri', None)
741 dmd_last_uploaded_uri = metadata.get('last_uploaded_uri', None)
743 if dmd_last_downloaded_uri is not None and db_entry.last_downloaded_uri is not None:
744 if dmd_last_downloaded_uri != db_entry.last_downloaded_uri:
746 self._count('objects_conflicted')
747 elif dmd_last_uploaded_uri is not None and dmd_last_uploaded_uri != db_entry.last_uploaded_uri:
749 self._count('objects_conflicted')
750 elif self._is_upload_pending(relpath_u):
752 self._count('objects_conflicted')
754 if relpath_u.endswith(u"/"):
755 if metadata.get('deleted', False):
756 self._log("rmdir(%r) ignored" % (abspath_u,))
758 self._log("mkdir(%r)" % (abspath_u,))
759 d.addCallback(lambda ign: fileutil.make_dirs(abspath_u))
760 d.addCallback(lambda ign: abspath_u)
762 if metadata.get('deleted', False):
763 d.addCallback(lambda ign: self._rename_deleted_file(abspath_u))
765 d.addCallback(lambda ign: file_node.download_best_version())
766 d.addCallback(lambda contents: self._write_downloaded_file(abspath_u, contents,
767 is_conflict=is_conflict))
769 d.addCallbacks(do_update_db, failed)
771 def trap_conflicts(f):
772 f.trap(ConflictError)
774 d.addErrback(trap_conflicts)