|
|
- package common
-
- import (
- fmt "fmt"
- "io"
- "os"
- "path/filepath"
- "strconv"
- "strings"
- "sync"
- "time"
- )
-
- const (
- atomicWriteFilePrefix = "write-file-atomic-"
- // Maximum number of atomic write file conflicts before we start reseeding
- // (reduced from golang's default 10 due to using an increased randomness space)
- atomicWriteFileMaxNumConflicts = 5
- // Maximum number of attempts to make at writing the write file before giving up
- // (reduced from golang's default 10000 due to using an increased randomness space)
- atomicWriteFileMaxNumWriteAttempts = 1000
- // LCG constants from Donald Knuth MMIX
- // This LCG's has a period equal to 2**64
- lcgA = 6364136223846793005
- lcgC = 1442695040888963407
- // Create in case it doesn't exist and force kernel
- // flush, which still leaves the potential of lingering disk cache.
- // Never overwrites files
- atomicWriteFileFlag = os.O_WRONLY | os.O_CREATE | os.O_SYNC | os.O_TRUNC | os.O_EXCL
- )
-
- var (
- atomicWriteFileRand uint64
- atomicWriteFileRandMu sync.Mutex
- )
-
- func writeFileRandReseed() uint64 {
- // Scale the PID, to minimize the chance that two processes seeded at similar times
- // don't get the same seed. Note that PID typically ranges in [0, 2**15), but can be
- // up to 2**22 under certain configurations. We left bit-shift the PID by 20, so that
- // a PID difference of one corresponds to a time difference of 2048 seconds.
- // The important thing here is that now for a seed conflict, they would both have to be on
- // the correct nanosecond offset, and second-based offset, which is much less likely than
- // just a conflict with the correct nanosecond offset.
- return uint64(time.Now().UnixNano() + int64(os.Getpid()<<20))
- }
-
- // Use a fast thread safe LCG for atomic write file names.
- // Returns a string corresponding to a 64 bit int.
- // If it was a negative int, the leading number is a 0.
- func randWriteFileSuffix() string {
- atomicWriteFileRandMu.Lock()
- r := atomicWriteFileRand
- if r == 0 {
- r = writeFileRandReseed()
- }
-
- // Update randomness according to lcg
- r = r*lcgA + lcgC
-
- atomicWriteFileRand = r
- atomicWriteFileRandMu.Unlock()
- // Can have a negative name, replace this in the following
- suffix := strconv.Itoa(int(r))
- if string(suffix[0]) == "-" {
- // Replace first "-" with "0". This is purely for UI clarity,
- // as otherwhise there would be two `-` in a row.
- suffix = strings.Replace(suffix, "-", "0", 1)
- }
- return suffix
- }
-
- // WriteFileAtomic creates a temporary file with data and provided perm and
- // swaps it atomically with filename if successful.
- func WriteFileAtomic(filename string, data []byte, perm os.FileMode) (err error) {
- // This implementation is inspired by the golang stdlibs method of creating
- // tempfiles. Notable differences are that we use different flags, a 64 bit LCG
- // and handle negatives differently.
- // The core reason we can't use golang's TempFile is that we must write
- // to the file synchronously, as we need this to persist to disk.
- // We also open it in write-only mode, to avoid concerns that arise with read.
- var (
- dir = filepath.Dir(filename)
- f *os.File
- )
-
- nconflict := 0
- // Limit the number of attempts to create a file. Something is seriously
- // wrong if it didn't get created after 1000 attempts, and we don't want
- // an infinite loop
- i := 0
- for ; i < atomicWriteFileMaxNumWriteAttempts; i++ {
- name := filepath.Join(dir, atomicWriteFilePrefix+randWriteFileSuffix())
- f, err = os.OpenFile(name, atomicWriteFileFlag, perm)
- // If the file already exists, try a new file
- if os.IsExist(err) {
- // If the files exists too many times, start reseeding as we've
- // likely hit another instances seed.
- if nconflict++; nconflict > atomicWriteFileMaxNumConflicts {
- atomicWriteFileRandMu.Lock()
- atomicWriteFileRand = writeFileRandReseed()
- atomicWriteFileRandMu.Unlock()
- }
- continue
- } else if err != nil {
- return err
- }
- break
- }
- if i == atomicWriteFileMaxNumWriteAttempts {
- return fmt.Errorf("could not create atomic write file after %d attempts", i)
- }
-
- // Clean up in any case. Defer stacking order is last-in-first-out.
- defer os.Remove(f.Name())
- defer f.Close()
-
- if n, err := f.Write(data); err != nil {
- return err
- } else if n < len(data) {
- return io.ErrShortWrite
- }
- // Close the file before renaming it, otherwise it will cause "The process
- // cannot access the file because it is being used by another process." on windows.
- f.Close()
-
- return os.Rename(f.Name(), filename)
- }
|