summaryrefslogtreecommitdiffstats
path: root/contrib/libc++/src/experimental/filesystem/operations.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/libc++/src/experimental/filesystem/operations.cpp')
-rw-r--r--contrib/libc++/src/experimental/filesystem/operations.cpp794
1 files changed, 794 insertions, 0 deletions
diff --git a/contrib/libc++/src/experimental/filesystem/operations.cpp b/contrib/libc++/src/experimental/filesystem/operations.cpp
new file mode 100644
index 0000000..369996f
--- /dev/null
+++ b/contrib/libc++/src/experimental/filesystem/operations.cpp
@@ -0,0 +1,794 @@
+//===--------------------- filesystem/ops.cpp -----------------------------===//
+//
+// The LLVM Compiler Infrastructure
+//
+// This file is dual licensed under the MIT and the University of Illinois Open
+// Source Licenses. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+
+#include "experimental/filesystem"
+#include "iterator"
+#include "fstream"
+#include "type_traits"
+#include "random" /* for unique_path */
+#include "cstdlib"
+#include "climits"
+
+#include <unistd.h>
+#include <sys/stat.h>
+#include <sys/statvfs.h>
+#include <fcntl.h> /* values for fchmodat */
+#if !defined(UTIME_OMIT)
+#include <sys/time.h> // for ::utimes as used in __last_write_time
+#endif
+
+_LIBCPP_BEGIN_NAMESPACE_EXPERIMENTAL_FILESYSTEM
+
+filesystem_error::~filesystem_error() {}
+
+
+// POSIX HELPERS
+
+namespace detail { namespace {
+
+using value_type = path::value_type;
+using string_type = path::string_type;
+
+
+
+inline std::error_code capture_errno() {
+ _LIBCPP_ASSERT(errno, "Expected errno to be non-zero");
+ std::error_code m_ec(errno, std::generic_category());
+ return m_ec;
+}
+
+void set_or_throw(std::error_code const& m_ec, std::error_code* ec,
+ const char* msg, path const& p = {}, path const& p2 = {})
+{
+ if (ec) {
+ *ec = m_ec;
+ } else {
+ string msg_s("std::experimental::filesystem::");
+ msg_s += msg;
+ __libcpp_throw(filesystem_error(msg_s, p, p2, m_ec));
+ }
+}
+
+void set_or_throw(std::error_code* ec, const char* msg,
+ path const& p = {}, path const& p2 = {})
+{
+ return set_or_throw(capture_errno(), ec, msg, p, p2);
+}
+
+perms posix_get_perms(const struct ::stat & st) noexcept {
+ return static_cast<perms>(st.st_mode) & perms::mask;
+}
+
+::mode_t posix_convert_perms(perms prms) {
+ return static_cast< ::mode_t>(prms & perms::mask);
+}
+
+file_status create_file_status(std::error_code& m_ec, path const& p,
+ struct ::stat& path_stat,
+ std::error_code* ec)
+{
+ if (ec) *ec = m_ec;
+ if (m_ec && (m_ec.value() == ENOENT || m_ec.value() == ENOTDIR)) {
+ return file_status(file_type::not_found);
+ }
+ else if (m_ec) {
+ set_or_throw(m_ec, ec, "posix_stat", p);
+ return file_status(file_type::none);
+ }
+ // else
+
+ file_status fs_tmp;
+ auto const mode = path_stat.st_mode;
+ if (S_ISLNK(mode)) fs_tmp.type(file_type::symlink);
+ else if (S_ISREG(mode)) fs_tmp.type(file_type::regular);
+ else if (S_ISDIR(mode)) fs_tmp.type(file_type::directory);
+ else if (S_ISBLK(mode)) fs_tmp.type(file_type::block);
+ else if (S_ISCHR(mode)) fs_tmp.type(file_type::character);
+ else if (S_ISFIFO(mode)) fs_tmp.type(file_type::fifo);
+ else if (S_ISSOCK(mode)) fs_tmp.type(file_type::socket);
+ else fs_tmp.type(file_type::unknown);
+
+ fs_tmp.permissions(detail::posix_get_perms(path_stat));
+ return fs_tmp;
+}
+
+file_status posix_stat(path const & p, struct ::stat& path_stat,
+ std::error_code* ec)
+{
+ std::error_code m_ec;
+ if (::stat(p.c_str(), &path_stat) == -1)
+ m_ec = detail::capture_errno();
+ return create_file_status(m_ec, p, path_stat, ec);
+}
+
+file_status posix_stat(path const & p, std::error_code* ec) {
+ struct ::stat path_stat;
+ return posix_stat(p, path_stat, ec);
+}
+
+file_status posix_lstat(path const & p, struct ::stat & path_stat,
+ std::error_code* ec)
+{
+ std::error_code m_ec;
+ if (::lstat(p.c_str(), &path_stat) == -1)
+ m_ec = detail::capture_errno();
+ return create_file_status(m_ec, p, path_stat, ec);
+}
+
+file_status posix_lstat(path const & p, std::error_code* ec) {
+ struct ::stat path_stat;
+ return posix_lstat(p, path_stat, ec);
+}
+
+bool stat_equivalent(struct ::stat& st1, struct ::stat& st2) {
+ return (st1.st_dev == st2.st_dev && st1.st_ino == st2.st_ino);
+}
+
+// DETAIL::MISC
+
+
+bool copy_file_impl(const path& from, const path& to, perms from_perms,
+ std::error_code *ec)
+{
+ std::ifstream in(from.c_str(), std::ios::binary);
+ std::ofstream out(to.c_str(), std::ios::binary);
+
+ if (in.good() && out.good()) {
+ using InIt = std::istreambuf_iterator<char>;
+ using OutIt = std::ostreambuf_iterator<char>;
+ InIt bin(in);
+ InIt ein;
+ OutIt bout(out);
+ std::copy(bin, ein, bout);
+ }
+ if (out.fail() || in.fail()) {
+ set_or_throw(make_error_code(errc::operation_not_permitted),
+ ec, "copy_file", from, to);
+ return false;
+ }
+ __permissions(to, from_perms, ec);
+ // TODO what if permissions fails?
+ return true;
+}
+
+}} // end namespace detail
+
+using detail::set_or_throw;
+
+path __canonical(path const & orig_p, const path& base, std::error_code *ec)
+{
+ path p = absolute(orig_p, base);
+ char buff[PATH_MAX + 1];
+ char *ret;
+ if ((ret = ::realpath(p.c_str(), buff)) == nullptr) {
+ set_or_throw(ec, "canonical", orig_p, base);
+ return {};
+ }
+ if (ec) ec->clear();
+ return {ret};
+}
+
+void __copy(const path& from, const path& to, copy_options options,
+ std::error_code *ec)
+{
+ const bool sym_status = bool(options &
+ (copy_options::create_symlinks | copy_options::skip_symlinks));
+
+ const bool sym_status2 = bool(options &
+ copy_options::copy_symlinks);
+
+ std::error_code m_ec;
+ struct ::stat f_st = {};
+ const file_status f = sym_status || sym_status2
+ ? detail::posix_lstat(from, f_st, &m_ec)
+ : detail::posix_stat(from, f_st, &m_ec);
+ if (m_ec)
+ return set_or_throw(m_ec, ec, "copy", from, to);
+
+ struct ::stat t_st = {};
+ const file_status t = sym_status ? detail::posix_lstat(to, t_st, &m_ec)
+ : detail::posix_stat(to, t_st, &m_ec);
+
+ if (not status_known(t))
+ return set_or_throw(m_ec, ec, "copy", from, to);
+
+ if (!exists(f) || is_other(f) || is_other(t)
+ || (is_directory(f) && is_regular_file(t))
+ || detail::stat_equivalent(f_st, t_st))
+ {
+ return set_or_throw(make_error_code(errc::function_not_supported),
+ ec, "copy", from, to);
+ }
+
+ if (ec) ec->clear();
+
+ if (is_symlink(f)) {
+ if (bool(copy_options::skip_symlinks & options)) {
+ // do nothing
+ } else if (not exists(t)) {
+ __copy_symlink(from, to, ec);
+ } else {
+ set_or_throw(make_error_code(errc::file_exists),
+ ec, "copy", from, to);
+ }
+ return;
+ }
+ else if (is_regular_file(f)) {
+ if (bool(copy_options::directories_only & options)) {
+ // do nothing
+ }
+ else if (bool(copy_options::create_symlinks & options)) {
+ __create_symlink(from, to, ec);
+ }
+ else if (bool(copy_options::create_hard_links & options)) {
+ __create_hard_link(from, to, ec);
+ }
+ else if (is_directory(t)) {
+ __copy_file(from, to / from.filename(), options, ec);
+ } else {
+ __copy_file(from, to, options, ec);
+ }
+ return;
+ }
+ else if (is_directory(f)) {
+ if (not bool(copy_options::recursive & options) &&
+ bool(copy_options::__in_recursive_copy & options))
+ {
+ return;
+ }
+
+ if (!exists(t)) {
+ // create directory to with attributes from 'from'.
+ __create_directory(to, from, ec);
+ if (ec && *ec) { return; }
+ }
+ directory_iterator it = ec ? directory_iterator(from, *ec)
+ : directory_iterator(from);
+ if (ec && *ec) { return; }
+ std::error_code m_ec;
+ for (; it != directory_iterator(); it.increment(m_ec)) {
+ if (m_ec) return set_or_throw(m_ec, ec, "copy", from, to);
+ __copy(it->path(), to / it->path().filename(),
+ options | copy_options::__in_recursive_copy, ec);
+ if (ec && *ec) { return; }
+ }
+ }
+}
+
+
+bool __copy_file(const path& from, const path& to, copy_options options,
+ std::error_code *ec)
+{
+ if (ec) ec->clear();
+
+ std::error_code m_ec;
+ auto from_st = detail::posix_stat(from, &m_ec);
+ if (not is_regular_file(from_st)) {
+ if (not m_ec)
+ m_ec = make_error_code(errc::not_supported);
+ set_or_throw(m_ec, ec, "copy_file", from, to);
+ return false;
+ }
+
+ auto to_st = detail::posix_stat(to, &m_ec);
+ if (!status_known(to_st)) {
+ set_or_throw(m_ec, ec, "copy_file", from, to);
+ return false;
+ }
+
+ const bool to_exists = exists(to_st);
+ if (to_exists && bool(copy_options::skip_existing & options)) {
+ return false;
+ }
+ else if (to_exists && bool(copy_options::update_existing & options)) {
+ auto from_time = __last_write_time(from, ec);
+ if (ec && *ec) { return false; }
+ auto to_time = __last_write_time(to, ec);
+ if (ec && *ec) { return false; }
+ if (from_time <= to_time) {
+ return false;
+ }
+ return detail::copy_file_impl(from, to, from_st.permissions(), ec);
+ }
+ else if (!to_exists || bool(copy_options::overwrite_existing & options)) {
+ return detail::copy_file_impl(from, to, from_st.permissions(), ec);
+ }
+ else {
+ set_or_throw(make_error_code(errc::file_exists), ec, "copy", from, to);
+ return false;
+ }
+}
+
+void __copy_symlink(const path& existing_symlink, const path& new_symlink,
+ std::error_code *ec)
+{
+ const path real_path(__read_symlink(existing_symlink, ec));
+ if (ec && *ec) { return; }
+ // NOTE: proposal says you should detect if you should call
+ // create_symlink or create_directory_symlink. I don't think this
+ // is needed with POSIX
+ __create_symlink(real_path, new_symlink, ec);
+}
+
+
+bool __create_directories(const path& p, std::error_code *ec)
+{
+ std::error_code m_ec;
+ auto const st = detail::posix_stat(p, &m_ec);
+ if (!status_known(st)) {
+ set_or_throw(m_ec, ec, "create_directories", p);
+ return false;
+ }
+ else if (is_directory(st)) {
+ if (ec) ec->clear();
+ return false;
+ }
+ else if (exists(st)) {
+ set_or_throw(make_error_code(errc::file_exists),
+ ec, "create_directories", p);
+ return false;
+ }
+
+ const path parent = p.parent_path();
+ if (!parent.empty()) {
+ const file_status parent_st = status(parent, m_ec);
+ if (not status_known(parent_st)) {
+ set_or_throw(m_ec, ec, "create_directories", p);
+ return false;
+ }
+ if (not exists(parent_st)) {
+ __create_directories(parent, ec);
+ if (ec && *ec) { return false; }
+ }
+ }
+ return __create_directory(p, ec);
+}
+
+bool __create_directory(const path& p, std::error_code *ec)
+{
+ if (ec) ec->clear();
+ if (::mkdir(p.c_str(), static_cast<int>(perms::all)) == 0)
+ return true;
+ if (errno != EEXIST || !is_directory(p))
+ set_or_throw(ec, "create_directory", p);
+ return false;
+}
+
+bool __create_directory(path const & p, path const & attributes,
+ std::error_code *ec)
+{
+ struct ::stat attr_stat;
+ std::error_code mec;
+ auto st = detail::posix_stat(attributes, attr_stat, &mec);
+ if (!status_known(st)) {
+ set_or_throw(mec, ec, "create_directory", p, attributes);
+ return false;
+ }
+ if (ec) ec->clear();
+ if (::mkdir(p.c_str(), attr_stat.st_mode) == 0)
+ return true;
+ if (errno != EEXIST || !is_directory(p))
+ set_or_throw(ec, "create_directory", p, attributes);
+ return false;
+}
+
+void __create_directory_symlink(path const & from, path const & to,
+ std::error_code *ec){
+ if (::symlink(from.c_str(), to.c_str()) != 0)
+ set_or_throw(ec, "create_directory_symlink", from, to);
+ else if (ec)
+ ec->clear();
+}
+
+void __create_hard_link(const path& from, const path& to, std::error_code *ec){
+ if (::link(from.c_str(), to.c_str()) == -1)
+ set_or_throw(ec, "create_hard_link", from, to);
+ else if (ec)
+ ec->clear();
+}
+
+void __create_symlink(path const & from, path const & to, std::error_code *ec) {
+
+ if (::symlink(from.c_str(), to.c_str()) == -1)
+ set_or_throw(ec, "create_symlink", from, to);
+ else if (ec)
+ ec->clear();
+}
+
+path __current_path(std::error_code *ec) {
+ auto size = ::pathconf(".", _PC_PATH_MAX);
+ _LIBCPP_ASSERT(size >= 0, "pathconf returned a 0 as max size");
+
+ auto buff = std::unique_ptr<char[]>(new char[size + 1]);
+ char* ret;
+ if ((ret = ::getcwd(buff.get(), static_cast<size_t>(size))) == nullptr) {
+ set_or_throw(ec, "current_path");
+ return {};
+ }
+ if (ec) ec->clear();
+ return {buff.get()};
+}
+
+void __current_path(const path& p, std::error_code *ec) {
+ if (::chdir(p.c_str()) == -1)
+ set_or_throw(ec, "current_path", p);
+ else if (ec)
+ ec->clear();
+}
+
+bool __equivalent(const path& p1, const path& p2, std::error_code *ec)
+{
+ std::error_code ec1, ec2;
+ struct ::stat st1 = {};
+ struct ::stat st2 = {};
+ auto s1 = detail::posix_stat(p1.native(), st1, &ec1);
+ auto s2 = detail::posix_stat(p2.native(), st2, &ec2);
+
+ if ((!exists(s1) && !exists(s2)) || (is_other(s1) && is_other(s2))) {
+ set_or_throw(make_error_code(errc::not_supported), ec,
+ "equivalent", p1, p2);
+ return false;
+ }
+ if (ec) ec->clear();
+ return (st1.st_dev == st2.st_dev && st1.st_ino == st2.st_ino);
+}
+
+
+std::uintmax_t __file_size(const path& p, std::error_code *ec)
+{
+ std::error_code m_ec;
+ struct ::stat st;
+ file_status fst = detail::posix_stat(p, st, &m_ec);
+ if (!exists(fst) || !is_regular_file(fst)) {
+ if (!m_ec)
+ m_ec = make_error_code(errc::not_supported);
+ set_or_throw(m_ec, ec, "file_size", p);
+ return static_cast<uintmax_t>(-1);
+ }
+ // is_regular_file(p) == true
+ if (ec) ec->clear();
+ return static_cast<std::uintmax_t>(st.st_size);
+}
+
+std::uintmax_t __hard_link_count(const path& p, std::error_code *ec)
+{
+ std::error_code m_ec;
+ struct ::stat st;
+ detail::posix_stat(p, st, &m_ec);
+ if (m_ec) {
+ set_or_throw(m_ec, ec, "hard_link_count", p);
+ return static_cast<std::uintmax_t>(-1);
+ }
+ if (ec) ec->clear();
+ return static_cast<std::uintmax_t>(st.st_nlink);
+}
+
+
+bool __fs_is_empty(const path& p, std::error_code *ec)
+{
+ if (ec) ec->clear();
+ std::error_code m_ec;
+ struct ::stat pst;
+ auto st = detail::posix_stat(p, pst, &m_ec);
+ if (is_directory(st))
+ return directory_iterator(p) == directory_iterator{};
+ else if (is_regular_file(st))
+ return static_cast<std::uintmax_t>(pst.st_size) == 0;
+ // else
+ set_or_throw(m_ec, ec, "is_empty", p);
+ return false;
+}
+
+
+namespace detail { namespace {
+
+template <class CType, class ChronoType>
+bool checked_set(CType* out, ChronoType time) {
+ using Lim = numeric_limits<CType>;
+ if (time > Lim::max() || time < Lim::min())
+ return false;
+ *out = static_cast<CType>(time);
+ return true;
+}
+
+constexpr long long min_seconds = file_time_type::duration::min().count()
+ / file_time_type::period::den;
+
+template <class SubSecDurT, class SubSecT>
+bool set_times_checked(time_t* sec_out, SubSecT* subsec_out, file_time_type tp) {
+ using namespace chrono;
+ auto dur = tp.time_since_epoch();
+ auto sec_dur = duration_cast<seconds>(dur);
+ auto subsec_dur = duration_cast<SubSecDurT>(dur - sec_dur);
+ // The tv_nsec and tv_usec fields must not be negative so adjust accordingly
+ if (subsec_dur.count() < 0) {
+ if (sec_dur.count() > min_seconds) {
+
+ sec_dur -= seconds(1);
+ subsec_dur += seconds(1);
+ } else {
+ subsec_dur = SubSecDurT::zero();
+ }
+ }
+ return checked_set(sec_out, sec_dur.count())
+ && checked_set(subsec_out, subsec_dur.count());
+}
+
+}} // end namespace detail
+
+
+file_time_type __last_write_time(const path& p, std::error_code *ec)
+{
+ std::error_code m_ec;
+ struct ::stat st;
+ detail::posix_stat(p, st, &m_ec);
+ if (m_ec) {
+ set_or_throw(m_ec, ec, "last_write_time", p);
+ return file_time_type::min();
+ }
+ if (ec) ec->clear();
+ return file_time_type::clock::from_time_t(st.st_mtime);
+}
+
+void __last_write_time(const path& p, file_time_type new_time,
+ std::error_code *ec)
+{
+ using namespace std::chrono;
+ std::error_code m_ec;
+
+ // We can use the presence of UTIME_OMIT to detect platforms that do not
+ // provide utimensat.
+#if !defined(UTIME_OMIT)
+ // This implementation has a race condition between determining the
+ // last access time and attempting to set it to the same value using
+ // ::utimes
+ struct ::stat st;
+ file_status fst = detail::posix_stat(p, st, &m_ec);
+ if (m_ec && !status_known(fst)) {
+ set_or_throw(m_ec, ec, "last_write_time", p);
+ return;
+ }
+ struct ::timeval tbuf[2];
+ tbuf[0].tv_sec = st.st_atime;
+ tbuf[0].tv_usec = 0;
+ const bool overflowed = !detail::set_times_checked<microseconds>(
+ &tbuf[1].tv_sec, &tbuf[1].tv_usec, new_time);
+
+ if (overflowed) {
+ set_or_throw(make_error_code(errc::invalid_argument), ec,
+ "last_write_time", p);
+ return;
+ }
+ if (::utimes(p.c_str(), tbuf) == -1) {
+ m_ec = detail::capture_errno();
+ }
+#else
+ struct ::timespec tbuf[2];
+ tbuf[0].tv_sec = 0;
+ tbuf[0].tv_nsec = UTIME_OMIT;
+
+ const bool overflowed = !detail::set_times_checked<nanoseconds>(
+ &tbuf[1].tv_sec, &tbuf[1].tv_nsec, new_time);
+ if (overflowed) {
+ set_or_throw(make_error_code(errc::invalid_argument),
+ ec, "last_write_time", p);
+ return;
+ }
+ if (::utimensat(AT_FDCWD, p.c_str(), tbuf, 0) == -1) {
+ m_ec = detail::capture_errno();
+ }
+#endif
+ if (m_ec)
+ set_or_throw(m_ec, ec, "last_write_time", p);
+ else if (ec)
+ ec->clear();
+}
+
+
+void __permissions(const path& p, perms prms, std::error_code *ec)
+{
+
+ const bool resolve_symlinks = !bool(perms::symlink_nofollow & prms);
+ const bool add_perms = bool(perms::add_perms & prms);
+ const bool remove_perms = bool(perms::remove_perms & prms);
+ _LIBCPP_ASSERT(!(add_perms && remove_perms),
+ "Both add_perms and remove_perms are set");
+
+ bool set_sym_perms = false;
+ prms &= perms::mask;
+ if (!resolve_symlinks || (add_perms || remove_perms)) {
+ std::error_code m_ec;
+ file_status st = resolve_symlinks ? detail::posix_stat(p, &m_ec)
+ : detail::posix_lstat(p, &m_ec);
+ set_sym_perms = is_symlink(st);
+ if (m_ec) return set_or_throw(m_ec, ec, "permissions", p);
+ _LIBCPP_ASSERT(st.permissions() != perms::unknown,
+ "Permissions unexpectedly unknown");
+ if (add_perms)
+ prms |= st.permissions();
+ else if (remove_perms)
+ prms = st.permissions() & ~prms;
+ }
+ const auto real_perms = detail::posix_convert_perms(prms);
+
+# if defined(AT_SYMLINK_NOFOLLOW) && defined(AT_FDCWD)
+ const int flags = set_sym_perms ? AT_SYMLINK_NOFOLLOW : 0;
+ if (::fchmodat(AT_FDCWD, p.c_str(), real_perms, flags) == -1) {
+ return set_or_throw(ec, "permissions", p);
+ }
+# else
+ if (set_sym_perms)
+ return set_or_throw(make_error_code(errc::operation_not_supported),
+ ec, "permissions", p);
+ if (::chmod(p.c_str(), real_perms) == -1) {
+ return set_or_throw(ec, "permissions", p);
+ }
+# endif
+ if (ec) ec->clear();
+}
+
+
+path __read_symlink(const path& p, std::error_code *ec) {
+ char buff[PATH_MAX + 1];
+ std::error_code m_ec;
+ ::ssize_t ret;
+ if ((ret = ::readlink(p.c_str(), buff, PATH_MAX)) == -1) {
+ set_or_throw(ec, "read_symlink", p);
+ return {};
+ }
+ _LIBCPP_ASSERT(ret <= PATH_MAX, "TODO");
+ _LIBCPP_ASSERT(ret > 0, "TODO");
+ if (ec) ec->clear();
+ buff[ret] = 0;
+ return {buff};
+}
+
+
+bool __remove(const path& p, std::error_code *ec) {
+ if (ec) ec->clear();
+ if (::remove(p.c_str()) == -1) {
+ set_or_throw(ec, "remove", p);
+ return false;
+ }
+ return true;
+}
+
+namespace {
+
+std::uintmax_t remove_all_impl(path const & p, std::error_code& ec)
+{
+ const auto npos = static_cast<std::uintmax_t>(-1);
+ const file_status st = __symlink_status(p, &ec);
+ if (ec) return npos;
+ std::uintmax_t count = 1;
+ if (is_directory(st)) {
+ for (directory_iterator it(p, ec); !ec && it != directory_iterator();
+ it.increment(ec)) {
+ auto other_count = remove_all_impl(it->path(), ec);
+ if (ec) return npos;
+ count += other_count;
+ }
+ if (ec) return npos;
+ }
+ if (!__remove(p, &ec)) return npos;
+ return count;
+}
+
+} // end namespace
+
+std::uintmax_t __remove_all(const path& p, std::error_code *ec) {
+ std::error_code mec;
+ auto count = remove_all_impl(p, mec);
+ if (mec) {
+ set_or_throw(mec, ec, "remove_all", p);
+ return static_cast<std::uintmax_t>(-1);
+ }
+ if (ec) ec->clear();
+ return count;
+}
+
+void __rename(const path& from, const path& to, std::error_code *ec) {
+ if (::rename(from.c_str(), to.c_str()) == -1)
+ set_or_throw(ec, "rename", from, to);
+ else if (ec)
+ ec->clear();
+}
+
+void __resize_file(const path& p, std::uintmax_t size, std::error_code *ec) {
+ if (::truncate(p.c_str(), static_cast<long>(size)) == -1)
+ set_or_throw(ec, "resize_file", p);
+ else if (ec)
+ ec->clear();
+}
+
+space_info __space(const path& p, std::error_code *ec) {
+ space_info si;
+ struct statvfs m_svfs = {};
+ if (::statvfs(p.c_str(), &m_svfs) == -1) {
+ set_or_throw(ec, "space", p);
+ si.capacity = si.free = si.available =
+ static_cast<std::uintmax_t>(-1);
+ return si;
+ }
+ if (ec) ec->clear();
+ // Multiply with overflow checking.
+ auto do_mult = [&](std::uintmax_t& out, std::uintmax_t other) {
+ out = other * m_svfs.f_frsize;
+ if (out / other != m_svfs.f_frsize || other == 0)
+ out = static_cast<std::uintmax_t>(-1);
+ };
+ do_mult(si.capacity, m_svfs.f_blocks);
+ do_mult(si.free, m_svfs.f_bfree);
+ do_mult(si.available, m_svfs.f_bavail);
+ return si;
+}
+
+file_status __status(const path& p, std::error_code *ec) {
+ return detail::posix_stat(p, ec);
+}
+
+file_status __symlink_status(const path& p, std::error_code *ec) {
+ return detail::posix_lstat(p, ec);
+}
+
+path __system_complete(const path& p, std::error_code *ec) {
+ if (ec) ec->clear();
+ return absolute(p, current_path());
+}
+
+path __temp_directory_path(std::error_code *ec) {
+ const char* env_paths[] = {"TMPDIR", "TMP", "TEMP", "TEMPDIR"};
+ const char* ret = nullptr;
+ for (auto & ep : env_paths) {
+ if ((ret = std::getenv(ep)))
+ break;
+ }
+ path p(ret ? ret : "/tmp");
+ std::error_code m_ec;
+ if (is_directory(p, m_ec)) {
+ if (ec) ec->clear();
+ return p;
+ }
+ if (!m_ec || m_ec == make_error_code(errc::no_such_file_or_directory))
+ m_ec = make_error_code(errc::not_a_directory);
+ set_or_throw(m_ec, ec, "temp_directory_path");
+ return {};
+}
+
+// An absolute path is composed according to the table in [fs.op.absolute].
+path absolute(const path& p, const path& base) {
+ auto root_name = p.root_name();
+ auto root_dir = p.root_directory();
+
+ if (!root_name.empty() && !root_dir.empty())
+ return p;
+
+ auto abs_base = base.is_absolute() ? base : absolute(base);
+
+ /* !has_root_name && !has_root_dir */
+ if (root_name.empty() && root_dir.empty())
+ {
+ return abs_base / p;
+ }
+ else if (!root_name.empty()) /* has_root_name && !has_root_dir */
+ {
+ return root_name / abs_base.root_directory()
+ /
+ abs_base.relative_path() / p.relative_path();
+ }
+ else /* !has_root_name && has_root_dir */
+ {
+ if (abs_base.has_root_name())
+ return abs_base.root_name() / p;
+ // else p is absolute, return outside of block
+ }
+ return p;
+}
+
+_LIBCPP_END_NAMESPACE_EXPERIMENTAL_FILESYSTEM
OpenPOWER on IntegriCloud