/**
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.camel.component.file;
import java.io.File;
import java.io.FileNotFoundException;
import java.nio.file.Files;
import java.nio.file.attribute.PosixFilePermission;
import java.util.HashSet;
import java.util.Set;
import org.apache.camel.Component;
import org.apache.camel.Exchange;
import org.apache.camel.Message;
import org.apache.camel.Processor;
import org.apache.camel.processor.idempotent.MemoryIdempotentRepository;
import org.apache.camel.spi.Metadata;
import org.apache.camel.spi.UriEndpoint;
import org.apache.camel.spi.UriParam;
import org.apache.camel.spi.UriPath;
import org.apache.camel.util.FileUtil;
import org.apache.camel.util.ObjectHelper;
/**
* The file component is used for reading or writing files.
*/
@UriEndpoint(firstVersion = "1.0.0", scheme = "file", title = "File", syntax = "file:directoryName", consumerClass = FileConsumer.class, label = "core,file")
public class FileEndpoint extends GenericFileEndpoint<File> {
private static final Integer CHMOD_WRITE_MASK = 02;
private static final Integer CHMOD_READ_MASK = 04;
private static final Integer CHMOD_EXECUTE_MASK = 01;
private final FileOperations operations = new FileOperations(this);
@UriPath(name = "directoryName") @Metadata(required = "true")
private File file;
@UriParam(label = "advanced", defaultValue = "true")
private boolean copyAndDeleteOnRenameFail = true;
@UriParam(label = "advanced")
private boolean renameUsingCopy;
@UriParam(label = "producer,advanced", defaultValue = "true")
private boolean forceWrites = true;
@UriParam(label = "consumer,advanced")
private boolean probeContentType;
@UriParam(label = "consumer,advanced")
private String extendedAttributes;
@UriParam(label = "producer,advanced")
private String chmod;
@UriParam(label = "producer,advanced")
private String chmodDirectory;
public FileEndpoint() {
// use marker file as default exclusive read locks
this.readLock = "markerFile";
}
public FileEndpoint(String endpointUri, Component component) {
super(endpointUri, component);
// use marker file as default exclusive read locks
this.readLock = "markerFile";
}
public FileConsumer createConsumer(Processor processor) throws Exception {
ObjectHelper.notNull(operations, "operations");
ObjectHelper.notNull(file, "file");
// auto create starting directory if needed
if (!file.exists() && !file.isDirectory()) {
if (isAutoCreate()) {
log.debug("Creating non existing starting directory: {}", file);
boolean absolute = FileUtil.isAbsolute(file);
boolean created = operations.buildDirectory(file.getPath(), absolute);
if (!created) {
log.warn("Cannot auto create starting directory: {}", file);
}
} else if (isStartingDirectoryMustExist()) {
throw new FileNotFoundException("Starting directory does not exist: " + file);
}
}
FileConsumer result = newFileConsumer(processor, operations);
if (isDelete() && getMove() != null) {
throw new IllegalArgumentException("You cannot set both delete=true and move options");
}
// if noop=true then idempotent should also be configured
if (isNoop() && !isIdempotentSet()) {
log.info("Endpoint is configured with noop=true so forcing endpoint to be idempotent as well");
setIdempotent(true);
}
// if idempotent and no repository set then create a default one
if (isIdempotentSet() && isIdempotent() && idempotentRepository == null) {
log.info("Using default memory based idempotent repository with cache max size: " + DEFAULT_IDEMPOTENT_CACHE_SIZE);
idempotentRepository = MemoryIdempotentRepository.memoryIdempotentRepository(DEFAULT_IDEMPOTENT_CACHE_SIZE);
}
// set max messages per poll
result.setMaxMessagesPerPoll(getMaxMessagesPerPoll());
result.setEagerLimitMaxMessagesPerPoll(isEagerMaxMessagesPerPoll());
configureConsumer(result);
return result;
}
public GenericFileProducer<File> createProducer() throws Exception {
ObjectHelper.notNull(operations, "operations");
// you cannot use temp file and file exists append
if (getFileExist() == GenericFileExist.Append && ((getTempPrefix() != null) || (getTempFileName() != null))) {
throw new IllegalArgumentException("You cannot set both fileExist=Append and tempPrefix/tempFileName options");
}
// ensure fileExist and moveExisting is configured correctly if in use
if (getFileExist() == GenericFileExist.Move && getMoveExisting() == null) {
throw new IllegalArgumentException("You must configure moveExisting option when fileExist=Move");
} else if (getMoveExisting() != null && getFileExist() != GenericFileExist.Move) {
throw new IllegalArgumentException("You must configure fileExist=Move when moveExisting has been set");
}
return new GenericFileProducer<File>(this, operations);
}
public Exchange createExchange(GenericFile<File> file) {
Exchange exchange = createExchange();
if (file != null) {
file.bindToExchange(exchange);
}
return exchange;
}
/**
* Strategy to create a new {@link FileConsumer}
*
* @param processor the given processor
* @param operations file operations
* @return the created consumer
*/
protected FileConsumer newFileConsumer(Processor processor, GenericFileOperations<File> operations) {
return new FileConsumer(this, processor, operations);
}
public File getFile() {
return file;
}
/**
* The starting directory
*/
public void setFile(File file) {
this.file = file;
// update configuration as well
getConfiguration().setDirectory(FileUtil.isAbsolute(file) ? file.getAbsolutePath() : file.getPath());
}
@Override
public String getScheme() {
return "file";
}
@Override
protected String createEndpointUri() {
return getFile().toURI().toString();
}
@Override
public char getFileSeparator() {
return File.separatorChar;
}
@Override
public boolean isAbsolute(String name) {
// relative or absolute path?
return FileUtil.isAbsolute(new File(name));
}
public boolean isCopyAndDeleteOnRenameFail() {
return copyAndDeleteOnRenameFail;
}
/**
* Whether to fallback and do a copy and delete file, in case the file could not be renamed directly. This option is not available for the FTP component.
*/
public void setCopyAndDeleteOnRenameFail(boolean copyAndDeleteOnRenameFail) {
this.copyAndDeleteOnRenameFail = copyAndDeleteOnRenameFail;
}
public boolean isRenameUsingCopy() {
return renameUsingCopy;
}
/**
* Perform rename operations using a copy and delete strategy.
* This is primarily used in environments where the regular rename operation is unreliable (e.g. across different file systems or networks).
* This option takes precedence over the copyAndDeleteOnRenameFail parameter that will automatically fall back to the copy and delete strategy,
* but only after additional delays.
*/
public void setRenameUsingCopy(boolean renameUsingCopy) {
this.renameUsingCopy = renameUsingCopy;
}
public boolean isForceWrites() {
return forceWrites;
}
/**
* Whether to force syncing writes to the file system.
* You can turn this off if you do not want this level of guarantee, for example if writing to logs / audit logs etc; this would yield better performance.
*/
public void setForceWrites(boolean forceWrites) {
this.forceWrites = forceWrites;
}
public boolean isProbeContentType() {
return probeContentType;
}
/**
* Whether to enable probing of the content type. If enable then the consumer uses {@link Files#probeContentType(java.nio.file.Path)} to
* determine the content-type of the file, and store that as a header with key {@link Exchange#FILE_CONTENT_TYPE} on the {@link Message}.
*/
public void setProbeContentType(boolean probeContentType) {
this.probeContentType = probeContentType;
}
public String getExtendedAttributes() {
return extendedAttributes;
}
/**
* To define which file attributes of interest. Like posix:permissions,posix:owner,basic:lastAccessTime,
* it supports basic wildcard like posix:*, basic:lastAccessTime
*/
public void setExtendedAttributes(String extendedAttributes) {
this.extendedAttributes = extendedAttributes;
}
/**
* Chmod value must be between 000 and 777; If there is a leading digit like in 0755 we will ignore it.
*/
public boolean chmodPermissionsAreValid(String chmod) {
if (chmod == null || chmod.length() < 3 || chmod.length() > 4) {
return false;
}
String permissionsString = chmod.trim().substring(chmod.length() - 3); // if 4 digits chop off leading one
for (int i = 0; i < permissionsString.length(); i++) {
Character c = permissionsString.charAt(i);
if (!Character.isDigit(c) || Integer.parseInt(c.toString()) > 7) {
return false;
}
}
return true;
}
public Set<PosixFilePermission> getPermissions() {
Set<PosixFilePermission> permissions = new HashSet<PosixFilePermission>();
if (ObjectHelper.isEmpty(chmod)) {
return permissions;
}
String chmodString = chmod.substring(chmod.length() - 3); // if 4 digits chop off leading one
Integer ownerValue = Integer.parseInt(chmodString.substring(0, 1));
Integer groupValue = Integer.parseInt(chmodString.substring(1, 2));
Integer othersValue = Integer.parseInt(chmodString.substring(2, 3));
if ((ownerValue & CHMOD_WRITE_MASK) > 0) {
permissions.add(PosixFilePermission.OWNER_WRITE);
}
if ((ownerValue & CHMOD_READ_MASK) > 0) {
permissions.add(PosixFilePermission.OWNER_READ);
}
if ((ownerValue & CHMOD_EXECUTE_MASK) > 0) {
permissions.add(PosixFilePermission.OWNER_EXECUTE);
}
if ((groupValue & CHMOD_WRITE_MASK) > 0) {
permissions.add(PosixFilePermission.GROUP_WRITE);
}
if ((groupValue & CHMOD_READ_MASK) > 0) {
permissions.add(PosixFilePermission.GROUP_READ);
}
if ((groupValue & CHMOD_EXECUTE_MASK) > 0) {
permissions.add(PosixFilePermission.GROUP_EXECUTE);
}
if ((othersValue & CHMOD_WRITE_MASK) > 0) {
permissions.add(PosixFilePermission.OTHERS_WRITE);
}
if ((othersValue & CHMOD_READ_MASK) > 0) {
permissions.add(PosixFilePermission.OTHERS_READ);
}
if ((othersValue & CHMOD_EXECUTE_MASK) > 0) {
permissions.add(PosixFilePermission.OTHERS_EXECUTE);
}
return permissions;
}
public String getChmod() {
return chmod;
}
/**
* Specify the file permissions which is sent by the producer, the chmod value must be between 000 and 777;
* If there is a leading digit like in 0755 we will ignore it.
*/
public void setChmod(String chmod) throws Exception {
if (ObjectHelper.isNotEmpty(chmod) && chmodPermissionsAreValid(chmod)) {
this.chmod = chmod.trim();
} else {
throw new IllegalArgumentException("chmod option [" + chmod + "] is not valid");
}
}
public Set<PosixFilePermission> getDirectoryPermissions() {
Set<PosixFilePermission> permissions = new HashSet<PosixFilePermission>();
if (ObjectHelper.isEmpty(chmodDirectory)) {
return permissions;
}
String chmodString = chmodDirectory.substring(chmodDirectory.length() - 3); // if 4 digits chop off leading one
Integer ownerValue = Integer.parseInt(chmodString.substring(0, 1));
Integer groupValue = Integer.parseInt(chmodString.substring(1, 2));
Integer othersValue = Integer.parseInt(chmodString.substring(2, 3));
if ((ownerValue & CHMOD_WRITE_MASK) > 0) {
permissions.add(PosixFilePermission.OWNER_WRITE);
}
if ((ownerValue & CHMOD_READ_MASK) > 0) {
permissions.add(PosixFilePermission.OWNER_READ);
}
if ((ownerValue & CHMOD_EXECUTE_MASK) > 0) {
permissions.add(PosixFilePermission.OWNER_EXECUTE);
}
if ((groupValue & CHMOD_WRITE_MASK) > 0) {
permissions.add(PosixFilePermission.GROUP_WRITE);
}
if ((groupValue & CHMOD_READ_MASK) > 0) {
permissions.add(PosixFilePermission.GROUP_READ);
}
if ((groupValue & CHMOD_EXECUTE_MASK) > 0) {
permissions.add(PosixFilePermission.GROUP_EXECUTE);
}
if ((othersValue & CHMOD_WRITE_MASK) > 0) {
permissions.add(PosixFilePermission.OTHERS_WRITE);
}
if ((othersValue & CHMOD_READ_MASK) > 0) {
permissions.add(PosixFilePermission.OTHERS_READ);
}
if ((othersValue & CHMOD_EXECUTE_MASK) > 0) {
permissions.add(PosixFilePermission.OTHERS_EXECUTE);
}
return permissions;
}
public String getChmodDirectory() {
return chmodDirectory;
}
/**
* Specify the directory permissions used when the producer creates missing directories, the chmod value must be between 000 and 777;
* If there is a leading digit like in 0755 we will ignore it.
*/
public void setChmodDirectory(String chmodDirectory) throws Exception {
if (ObjectHelper.isNotEmpty(chmodDirectory) && chmodPermissionsAreValid(chmodDirectory)) {
this.chmodDirectory = chmodDirectory.trim();
} else {
throw new IllegalArgumentException("chmodDirectory option [" + chmodDirectory + "] is not valid");
}
}
}