aboutsummaryrefslogtreecommitdiffstats
path: root/server/sonar-process
diff options
context:
space:
mode:
authorJenkins CI <ci@sonarsource.com>2016-02-15 08:11:57 +0100
committerJenkins CI <ci@sonarsource.com>2016-02-15 08:11:57 +0100
commitaa82282b15b0ea160d1e227ec1532b4cb7b49520 (patch)
tree1a07f487eec1e5254473e200e517754e71620218 /server/sonar-process
parent640ae85cdd30643c8c58ab092b998274422758d0 (diff)
parente93851854a5ab728fba5e83b81b7a4a24208481a (diff)
downloadsonarqube-aa82282b15b0ea160d1e227ec1532b4cb7b49520.tar.gz
sonarqube-aa82282b15b0ea160d1e227ec1532b4cb7b49520.zip
Automatic merge from branch-5.4
* origin/branch-5.4: Refactor a bit ComponentContainer stabilize ProjectDrilldownTest SONAR-7125 use efficient delete dir code in core, batch and server SONAR-7125 use efficient delete dir from NIO in sonar-api SONAR-7125 add FileUtils in sonar-core with efficient delete methods SONAR-7125 use efficient delete dir method in sonar-process SONAR-7125 use nio to clean temp directory at startup
Diffstat (limited to 'server/sonar-process')
-rw-r--r--server/sonar-process/src/main/java/org/sonar/process/ConfigurationUtils.java10
-rw-r--r--server/sonar-process/src/main/java/org/sonar/process/FileUtils.java180
-rw-r--r--server/sonar-process/src/main/java/org/sonar/process/MinimumViableSystem.java4
-rw-r--r--server/sonar-process/src/test/java/org/sonar/process/FileUtilsTest.java245
4 files changed, 432 insertions, 7 deletions
diff --git a/server/sonar-process/src/main/java/org/sonar/process/ConfigurationUtils.java b/server/sonar-process/src/main/java/org/sonar/process/ConfigurationUtils.java
index 045b4e581ca..734a57f8adb 100644
--- a/server/sonar-process/src/main/java/org/sonar/process/ConfigurationUtils.java
+++ b/server/sonar-process/src/main/java/org/sonar/process/ConfigurationUtils.java
@@ -19,10 +19,6 @@
*/
package org.sonar.process;
-import org.apache.commons.io.FileUtils;
-import org.apache.commons.io.IOUtils;
-import org.apache.commons.lang.text.StrSubstitutor;
-
import java.io.File;
import java.io.FileInputStream;
import java.io.InputStreamReader;
@@ -31,6 +27,10 @@ import java.nio.charset.StandardCharsets;
import java.util.Enumeration;
import java.util.Map;
import java.util.Properties;
+import org.apache.commons.io.IOUtils;
+import org.apache.commons.lang.text.StrSubstitutor;
+
+import static org.apache.commons.io.FileUtils.deleteQuietly;
public final class ConfigurationUtils {
@@ -66,7 +66,7 @@ public final class ConfigurationUtils {
throw new IllegalStateException("Could not read properties from file: " + args[0], e);
} finally {
IOUtils.closeQuietly(reader);
- FileUtils.deleteQuietly(propertyFile);
+ deleteQuietly(propertyFile);
}
return new Props(properties);
}
diff --git a/server/sonar-process/src/main/java/org/sonar/process/FileUtils.java b/server/sonar-process/src/main/java/org/sonar/process/FileUtils.java
new file mode 100644
index 00000000000..f25ac1f101a
--- /dev/null
+++ b/server/sonar-process/src/main/java/org/sonar/process/FileUtils.java
@@ -0,0 +1,180 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2016 SonarSource SA
+ * mailto:contact AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.process;
+
+import java.io.File;
+import java.io.IOException;
+import java.nio.file.FileVisitOption;
+import java.nio.file.FileVisitResult;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.nio.file.SimpleFileVisitor;
+import java.nio.file.attribute.BasicFileAttributes;
+import java.util.EnumSet;
+import javax.annotation.Nullable;
+
+import static java.lang.String.format;
+import static java.util.Objects.requireNonNull;
+
+/**
+ * This utility class provides Java NIO based replacement for some methods of
+ * {@link org.apache.commons.io.FileUtils Common IO FileUtils} class.
+ */
+public final class FileUtils {
+ private static final String DIRECTORY_CAN_NOT_BE_NULL = "Directory can not be null";
+ private static final EnumSet<FileVisitOption> FOLLOW_LINKS = EnumSet.of(FileVisitOption.FOLLOW_LINKS);
+
+ private FileUtils() {
+ // prevents instantiation
+ }
+
+ /**
+ * Cleans a directory recursively.
+ *
+ * @param directory directory to delete
+ * @throws IOException in case deletion is unsuccessful
+ */
+ public static void cleanDirectory(File directory) throws IOException {
+ requireNonNull(directory, DIRECTORY_CAN_NOT_BE_NULL);
+ if (!directory.exists()) {
+ return;
+ }
+
+ cleanDirectoryImpl(directory.toPath());
+ }
+
+ /**
+ * Deletes a file, never throwing an exception. If file is a directory, delete it and all sub-directories.
+ * <p>
+ * The difference between File.delete() and this method are:
+ * <ul>
+ * <li>A directory to be deleted does not have to be empty.</li>
+ * <li>No exceptions are thrown when a file or directory cannot be deleted.</li>
+ * </ul>
+ *
+ * @param file file or directory to delete, can be {@code null}
+ * @return {@code true} if the file or directory was deleted, otherwise {@code false}
+ */
+ public static boolean deleteQuietly(@Nullable File file) {
+ if (file == null) {
+ return false;
+ }
+
+ try {
+ if (file.isDirectory()) {
+ deleteDirectory(file);
+ } else {
+ Files.delete(file.toPath());
+ }
+ return true;
+ } catch (IOException | SecurityException ignored) {
+ return false;
+ }
+ }
+
+ /**
+ * Deletes a directory recursively. Does not support symbolic link to directories.
+ *
+ * @param directory directory to delete
+ * @throws IOException in case deletion is unsuccessful
+ */
+ public static void deleteDirectory(File directory) throws IOException {
+ requireNonNull(directory, DIRECTORY_CAN_NOT_BE_NULL);
+
+ Path path = directory.toPath();
+ if (!Files.exists(path)) {
+ return;
+ }
+
+ if (Files.isSymbolicLink(path)) {
+ throw new IOException(format("Directory '%s' is a symbolic link", directory));
+ }
+ if (Files.isRegularFile(path)) {
+ throw new IOException(format("Directory '%s' is a file", directory));
+ }
+ deleteDirectoryImpl(path);
+
+ if (Files.exists(path)) {
+ throw new IOException(format("Unable to delete directory '%s'", directory));
+ }
+ }
+
+ private static void cleanDirectoryImpl(Path path) throws IOException {
+ if (!Files.isDirectory(path)) {
+ throw new IllegalArgumentException(format("'%s' is not a directory", path));
+ }
+ Files.walkFileTree(path, FOLLOW_LINKS, CleanDirectoryFileVisitor.VISIT_MAX_DEPTH, new CleanDirectoryFileVisitor(path));
+ }
+
+ private static void deleteDirectoryImpl(Path path) throws IOException {
+ Files.walkFileTree(path, DeleteRecursivelyFileVisitor.INSTANCE);
+ }
+
+ /**
+ * This visitor is intended to be used to visit direct children of directory <strong>or a symLink to a directory</strong>,
+ * so, with a max depth of {@link #VISIT_MAX_DEPTH 1}. Each direct children will either be directly deleted (if file)
+ * or recursively deleted (if directory).
+ */
+ private static class CleanDirectoryFileVisitor extends SimpleFileVisitor<Path> {
+ public static final int VISIT_MAX_DEPTH = 1;
+
+ private final Path path;
+ private final boolean symLink;
+
+ public CleanDirectoryFileVisitor(Path path) {
+ this.path = path;
+ this.symLink = Files.isSymbolicLink(path);
+ }
+
+ @Override
+ public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) throws IOException {
+ if (Files.isDirectory(file)) {
+ deleteDirectoryImpl(file);
+ } else if (!symLink || !file.equals(path)) {
+ Files.delete(file);
+ }
+ return FileVisitResult.CONTINUE;
+ }
+
+ @Override
+ public FileVisitResult postVisitDirectory(Path dir, IOException exc) throws IOException {
+ if (!dir.equals(path)) {
+ deleteDirectoryImpl(dir);
+ }
+ return FileVisitResult.CONTINUE;
+ }
+ }
+
+ private static final class DeleteRecursivelyFileVisitor extends SimpleFileVisitor<Path> {
+ public static final DeleteRecursivelyFileVisitor INSTANCE = new DeleteRecursivelyFileVisitor();
+
+ @Override
+ public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) throws IOException {
+ Files.delete(file);
+ return FileVisitResult.CONTINUE;
+ }
+
+ @Override
+ public FileVisitResult postVisitDirectory(Path dir, IOException exc) throws IOException {
+ Files.delete(dir);
+ return FileVisitResult.CONTINUE;
+ }
+ }
+}
diff --git a/server/sonar-process/src/main/java/org/sonar/process/MinimumViableSystem.java b/server/sonar-process/src/main/java/org/sonar/process/MinimumViableSystem.java
index 320bb133cee..3b20d57c5dc 100644
--- a/server/sonar-process/src/main/java/org/sonar/process/MinimumViableSystem.java
+++ b/server/sonar-process/src/main/java/org/sonar/process/MinimumViableSystem.java
@@ -19,7 +19,6 @@
*/
package org.sonar.process;
-import org.apache.commons.io.FileUtils;
import org.apache.commons.lang.StringUtils;
import java.io.File;
@@ -27,6 +26,7 @@ import java.io.IOException;
import java.util.Map;
import static java.lang.String.format;
+import static org.sonar.process.FileUtils.deleteQuietly;
public class MinimumViableSystem {
@@ -42,7 +42,7 @@ public class MinimumViableSystem {
void checkWritableDir(String tempPath) {
try {
File tempFile = File.createTempFile("check", "tmp", new File(tempPath));
- FileUtils.deleteQuietly(tempFile);
+ deleteQuietly(tempFile);
} catch (IOException e) {
throw new IllegalStateException(format("Temp directory is not writable: %s", tempPath), e);
}
diff --git a/server/sonar-process/src/test/java/org/sonar/process/FileUtilsTest.java b/server/sonar-process/src/test/java/org/sonar/process/FileUtilsTest.java
new file mode 100644
index 00000000000..9b1b0ce6d12
--- /dev/null
+++ b/server/sonar-process/src/test/java/org/sonar/process/FileUtilsTest.java
@@ -0,0 +1,245 @@
+/*
+ * SonarQube
+ * Copyright (C) 2009-2016 SonarSource SA
+ * mailto:contact AT sonarsource DOT com
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation; either
+ * version 3 of the License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public License
+ * along with this program; if not, write to the Free Software Foundation,
+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ */
+package org.sonar.process;
+
+import java.io.File;
+import java.io.IOException;
+import java.nio.file.Files;
+import java.nio.file.Path;
+import java.nio.file.attribute.BasicFileAttributes;
+import javax.annotation.CheckForNull;
+import org.junit.Rule;
+import org.junit.Test;
+import org.junit.rules.ExpectedException;
+import org.junit.rules.TemporaryFolder;
+
+import static org.assertj.core.api.Assertions.assertThat;
+
+public class FileUtilsTest {
+ @Rule
+ public TemporaryFolder temporaryFolder = new TemporaryFolder();
+ @Rule
+ public ExpectedException expectedException = ExpectedException.none();
+
+ @Test
+ public void cleanDirectory_throws_NPE_if_file_is_null() throws IOException {
+ expectDirectoryCanNotBeNullNPE();
+
+ FileUtils.cleanDirectory(null);
+ }
+
+ @Test
+ public void cleanDirectory_does_nothing_if_argument_does_not_exist() throws IOException {
+ FileUtils.cleanDirectory(new File("/a/b/ToDoSSS"));
+ }
+
+ @Test
+ public void cleanDirectory_throws_IAE_if_argument_is_a_file() throws IOException {
+ File file = temporaryFolder.newFile();
+
+ expectedException.expect(IllegalArgumentException.class);
+ expectedException.expectMessage("'" + file.getAbsolutePath() + "' is not a directory");
+
+ FileUtils.cleanDirectory(file);
+ }
+
+ @Test
+ public void cleanDirectory_removes_directories_and_files_in_target_directory_but_not_target_directory() throws IOException {
+ Path target = temporaryFolder.newFolder().toPath();
+ Path childFile1 = Files.createFile(target.resolve("file1.txt"));
+ Path childDir1 = Files.createDirectory(target.resolve("subDir1"));
+ Path childFile2 = Files.createFile(childDir1.resolve("file2.txt"));
+ Path childDir2 = Files.createDirectory(childDir1.resolve("subDir2"));
+
+ assertThat(target).isDirectory();
+ assertThat(childFile1).isRegularFile();
+ assertThat(childDir1).isDirectory();
+ assertThat(childFile2).isRegularFile();
+ assertThat(childDir2).isDirectory();
+
+ // on supporting FileSystem, target will change if directory is recreated
+ Object targetKey = getFileKey(target);
+
+ FileUtils.cleanDirectory(target.toFile());
+
+ assertThat(target).isDirectory();
+ assertThat(childFile1).doesNotExist();
+ assertThat(childDir1).doesNotExist();
+ assertThat(childFile2).doesNotExist();
+ assertThat(childDir2).doesNotExist();
+ assertThat(getFileKey(target)).isEqualTo(targetKey);
+ }
+
+ @Test
+ public void cleanDirectory_follows_symlink_to_target_directory() throws IOException {
+ Path target = temporaryFolder.newFolder().toPath();
+ Path symToDir = Files.createSymbolicLink(temporaryFolder.newFolder().toPath().resolve("sym_to_dir"), target);
+ Path childFile1 = Files.createFile(target.resolve("file1.txt"));
+ Path childDir1 = Files.createDirectory(target.resolve("subDir1"));
+ Path childFile2 = Files.createFile(childDir1.resolve("file2.txt"));
+ Path childDir2 = Files.createDirectory(childDir1.resolve("subDir2"));
+
+ assertThat(target).isDirectory();
+ assertThat(symToDir).isSymbolicLink();
+ assertThat(childFile1).isRegularFile();
+ assertThat(childDir1).isDirectory();
+ assertThat(childFile2).isRegularFile();
+ assertThat(childDir2).isDirectory();
+
+ // on supporting FileSystem, target will change if directory is recreated
+ Object targetKey = getFileKey(target);
+ Object symLinkKey = getFileKey(symToDir);
+
+ FileUtils.cleanDirectory(symToDir.toFile());
+
+ assertThat(target).isDirectory();
+ assertThat(symToDir).isSymbolicLink();
+ assertThat(childFile1).doesNotExist();
+ assertThat(childDir1).doesNotExist();
+ assertThat(childFile2).doesNotExist();
+ assertThat(childDir2).doesNotExist();
+ assertThat(getFileKey(target)).isEqualTo(targetKey);
+ assertThat(getFileKey(symToDir)).isEqualTo(symLinkKey);
+ }
+
+ @Test
+ public void deleteQuietly_does_not_fail_if_argument_is_null() {
+ FileUtils.deleteQuietly(null);
+ }
+
+ @Test
+ public void deleteQuietly_does_not_fail_if_file_does_not_exist() throws IOException {
+ File file = new File(temporaryFolder.newFolder(), "blablabl");
+ assertThat(file).doesNotExist();
+
+ FileUtils.deleteQuietly(file);
+ }
+
+ @Test
+ public void deleteQuietly_deletes_directory_and_content() throws IOException {
+ Path target = temporaryFolder.newFolder().toPath();
+ Path childFile1 = Files.createFile(target.resolve("file1.txt"));
+ Path childDir1 = Files.createDirectory(target.resolve("subDir1"));
+ Path childFile2 = Files.createFile(childDir1.resolve("file2.txt"));
+ Path childDir2 = Files.createDirectory(childDir1.resolve("subDir2"));
+
+ assertThat(target).isDirectory();
+ assertThat(childFile1).isRegularFile();
+ assertThat(childDir1).isDirectory();
+ assertThat(childFile2).isRegularFile();
+ assertThat(childDir2).isDirectory();
+
+ FileUtils.deleteQuietly(target.toFile());
+
+ assertThat(target).doesNotExist();
+ assertThat(childFile1).doesNotExist();
+ assertThat(childDir1).doesNotExist();
+ assertThat(childFile2).doesNotExist();
+ assertThat(childDir2).doesNotExist();
+ }
+
+ @Test
+ public void deleteQuietly_deletes_symbolicLink() throws IOException {
+ Path folder = temporaryFolder.newFolder().toPath();
+ Path file1 = Files.createFile(folder.resolve("file1.txt"));
+ Path symLink = Files.createSymbolicLink(folder.resolve("link1"), file1);
+
+ assertThat(file1).isRegularFile();
+ assertThat(symLink).isSymbolicLink();
+
+ FileUtils.deleteQuietly(symLink.toFile());
+
+ assertThat(symLink).doesNotExist();
+ assertThat(file1).isRegularFile();
+ }
+
+ @Test
+ public void deleteDirectory_throws_NPE_if_argument_is_null() throws IOException {
+ expectDirectoryCanNotBeNullNPE();
+
+ FileUtils.deleteDirectory(null);
+ }
+
+ @Test
+ public void deleteDirectory_does_not_fail_if_file_does_not_exist() throws IOException {
+ File file = new File(temporaryFolder.newFolder(), "foo.d");
+
+ FileUtils.deleteDirectory(file);
+ }
+
+ @Test
+ public void deleteDirectory_throws_IOE_if_argument_is_a_file() throws IOException {
+ File file = temporaryFolder.newFile();
+
+ expectedException.expect(IOException.class);
+ expectedException.expectMessage("Directory '" + file.getAbsolutePath() + "' is a file");
+
+ FileUtils.deleteDirectory(file);
+ }
+
+ @Test
+ public void deleteDirectory_throws_IOE_if_file_is_symbolicLink() throws IOException {
+ Path folder = temporaryFolder.newFolder().toPath();
+ Path file1 = Files.createFile(folder.resolve("file1.txt"));
+ Path symLink = Files.createSymbolicLink(folder.resolve("link1"), file1);
+
+ assertThat(file1).isRegularFile();
+ assertThat(symLink).isSymbolicLink();
+
+ expectedException.expect(IOException.class);
+ expectedException.expectMessage("Directory '" + symLink.toFile().getAbsolutePath() + "' is a symbolic link");
+
+ FileUtils.deleteDirectory(symLink.toFile());
+ }
+
+ @Test
+ public void deleteDirectory_deletes_directory_and_content() throws IOException {
+ Path target = temporaryFolder.newFolder().toPath();
+ Path childFile1 = Files.createFile(target.resolve("file1.txt"));
+ Path childDir1 = Files.createDirectory(target.resolve("subDir1"));
+ Path childFile2 = Files.createFile(childDir1.resolve("file2.txt"));
+ Path childDir2 = Files.createDirectory(childDir1.resolve("subDir2"));
+
+ assertThat(target).isDirectory();
+ assertThat(childFile1).isRegularFile();
+ assertThat(childDir1).isDirectory();
+ assertThat(childFile2).isRegularFile();
+ assertThat(childDir2).isDirectory();
+
+ FileUtils.deleteQuietly(target.toFile());
+
+ assertThat(target).doesNotExist();
+ assertThat(childFile1).doesNotExist();
+ assertThat(childDir1).doesNotExist();
+ assertThat(childFile2).doesNotExist();
+ assertThat(childDir2).doesNotExist();
+ }
+
+ private void expectDirectoryCanNotBeNullNPE() {
+ expectedException.expect(NullPointerException.class);
+ expectedException.expectMessage("Directory can not be null");
+ }
+
+ @CheckForNull
+ private static Object getFileKey(Path path) throws IOException {
+ BasicFileAttributes attrs = Files.readAttributes(path, BasicFileAttributes.class);
+ return attrs.fileKey();
+ }
+}