@zenfs/core 2.4.3 → 2.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -163,6 +163,19 @@ fs.umount('/mnt/zip'); // finished using the zip
163
163
 
164
164
  ZenFS includes support for device files. These are designed to follow Linux's device file behavior, for consistency and ease of use. Check out the [Devices and Device Drivers](https://zenfs.dev/core/documents/Devices_and_Device_Drivers) documentation for more information.
165
165
 
166
+ ## `node:*` emulation
167
+
168
+ ZenFS also includes emulation of some other `node:` modules for various reasons, importable from `@zenfs/core/<name>`:
169
+
170
+ - `node:path`
171
+ - `node:readline`
172
+
173
+ For example:
174
+
175
+ ```ts
176
+ import * as path from '@zenfs/core/path';
177
+ ```
178
+
166
179
  ## Bundling
167
180
 
168
181
  ZenFS exports a drop-in for Node's `fs` module, so you can use it for your bundler of preference using the default export.
@@ -1,5 +1,6 @@
1
1
  import type { CreationOptions, StreamOptions, UsageInfo } from '../internal/filesystem.js';
2
2
  import type { InodeLike } from '../internal/inode.js';
3
+ import type { Backend } from './backend.js';
3
4
  import { EventEmitter } from 'eventemitter3';
4
5
  import { type MountConfiguration } from '../config.js';
5
6
  import { FileSystem } from '../internal/filesystem.js';
@@ -9,18 +10,17 @@ import { FileSystem } from '../internal/filesystem.js';
9
10
  */
10
11
  export interface CopyOnWriteOptions {
11
12
  /** The file system that initially populates this file system. */
12
- readable: MountConfiguration<any>;
13
+ readable: MountConfiguration<Backend>;
13
14
  /** The file system to write modified files to. */
14
- writable: MountConfiguration<any>;
15
+ writable: MountConfiguration<Backend>;
15
16
  /** @see {@link Journal} */
16
17
  journal?: Journal;
17
18
  }
18
- declare const journalOperations: readonly ["delete"];
19
19
  /**
20
20
  * @category Internals
21
21
  * @internal
22
22
  */
23
- export type JournalOperation = (typeof journalOperations)[number];
23
+ export type JournalOperation = 'delete';
24
24
  /**
25
25
  * @category Internals
26
26
  * @internal
@@ -61,6 +61,7 @@ export declare class CopyOnWriteFS extends FileSystem {
61
61
  /** The journal to use for persisting deletions */
62
62
  readonly journal: Journal;
63
63
  ready(): Promise<void>;
64
+ readySync(): void;
64
65
  constructor(
65
66
  /** The file system that initially populates this file system. */
66
67
  readable: FileSystem,
@@ -6,12 +6,12 @@ import { resolveMountConfig } from '../config.js';
6
6
  import { FileSystem } from '../internal/filesystem.js';
7
7
  import { isDirectory } from '../internal/inode.js';
8
8
  import { dirname, join } from '../path.js';
9
- const journalOperations = ['delete'];
9
+ const journalOperations = new Set(['delete']);
10
10
  /** Because TS doesn't work right w/o it */
11
11
  function isJournalOp(op) {
12
- return journalOperations.includes(op);
12
+ return journalOperations.has(op);
13
13
  }
14
- const maxOpLength = Math.max(...journalOperations.map(op => op.length));
14
+ const maxOpLength = Math.max(...journalOperations.values().map(op => op.length));
15
15
  const journalMagicString = '#journal@v0\n';
16
16
  /**
17
17
  * Tracks various operations for the CoW backend
@@ -79,6 +79,10 @@ export class CopyOnWriteFS extends FileSystem {
79
79
  await this.readable.ready();
80
80
  await this.writable.ready();
81
81
  }
82
+ readySync() {
83
+ this.readable.readySync();
84
+ this.writable.readySync();
85
+ }
82
86
  constructor(
83
87
  /** The file system that initially populates this file system. */
84
88
  readable,
@@ -54,7 +54,6 @@ var __disposeResources = (this && this.__disposeResources) || (function (Suppres
54
54
  import { err, warn } from 'kerium/log';
55
55
  import { FileSystem } from '../internal/filesystem.js';
56
56
  import { isDirectory } from '../internal/inode.js';
57
- import { resolve } from '../path.js';
58
57
  export class PassthroughFS extends FileSystem {
59
58
  nodeFS;
60
59
  prefix;
@@ -306,7 +305,7 @@ const _Passthrough = {
306
305
  prefix: { type: 'string', required: true },
307
306
  },
308
307
  create({ fs, prefix }) {
309
- return new PassthroughFS(fs, resolve(prefix));
308
+ return new PassthroughFS(fs, prefix);
310
309
  },
311
310
  };
312
311
  /**
@@ -40,6 +40,7 @@ export declare class StoreFS<T extends Store = Store> extends FileSystem {
40
40
  _move(from: string, to: string): void;
41
41
  protected _initialized: boolean;
42
42
  ready(): Promise<void>;
43
+ readySync(): void;
43
44
  constructor(store: T);
44
45
  /**
45
46
  * @experimental
@@ -107,6 +108,7 @@ export declare class StoreFS<T extends Store = Store> extends FileSystem {
107
108
  * Populates the `_ids` and `_paths` maps with all existing files stored in the underlying `Store`.
108
109
  */
109
110
  private _populate;
111
+ private _populateSync;
110
112
  /**
111
113
  * Find an inode without using the ID tables
112
114
  */
@@ -144,6 +144,16 @@ export class StoreFS extends FileSystem {
144
144
  await this._populate();
145
145
  this._initialized = true;
146
146
  }
147
+ readySync() {
148
+ if (this._initialized)
149
+ return;
150
+ if (!this.attributes.has('no_async_preload')) {
151
+ this.checkRootSync();
152
+ }
153
+ this.checkRootSync();
154
+ this._populateSync();
155
+ this._initialized = true;
156
+ }
147
157
  constructor(store) {
148
158
  super(store.type ?? 0x6b766673, store.name);
149
159
  this.store = store;
@@ -781,6 +791,70 @@ export class StoreFS extends FileSystem {
781
791
  await result_11;
782
792
  }
783
793
  }
794
+ _populateSync() {
795
+ const env_22 = { stack: [], error: void 0, hasError: false };
796
+ try {
797
+ if (this._initialized) {
798
+ warn('Attempted to populate tables after initialization');
799
+ return;
800
+ }
801
+ debug('Populating tables with existing store metadata');
802
+ const tx = __addDisposableResource(env_22, this.transaction(), false);
803
+ const rootData = tx.getSync(rootIno);
804
+ if (!rootData) {
805
+ notice('Store does not have a root inode');
806
+ const inode = new Inode({ ino: rootIno, data: 1, mode: 0o777 | S_IFDIR });
807
+ tx.setSync(inode.data, encodeUTF8('{}'));
808
+ this._add(rootIno, '/');
809
+ tx.setSync(rootIno, inode);
810
+ tx.commitSync();
811
+ return;
812
+ }
813
+ if (rootData.length < sizeof(Inode)) {
814
+ crit('Store contains an invalid root inode. Refusing to populate tables');
815
+ return;
816
+ }
817
+ const visitedDirectories = new Set();
818
+ let i = 0;
819
+ const queue = [['/', rootIno]];
820
+ while (queue.length > 0) {
821
+ i++;
822
+ const [path, ino] = queue.shift();
823
+ this._add(ino, path);
824
+ const inodeData = tx.getSync(ino);
825
+ if (!inodeData) {
826
+ warn('Store is missing data for inode: ' + ino);
827
+ continue;
828
+ }
829
+ if (inodeData.length < sizeof(Inode)) {
830
+ warn(`Invalid inode size for ino ${ino}: ${inodeData.length}`);
831
+ continue;
832
+ }
833
+ const inode = new Inode(inodeData);
834
+ if ((inode.mode & S_IFDIR) != S_IFDIR || visitedDirectories.has(ino)) {
835
+ continue;
836
+ }
837
+ visitedDirectories.add(ino);
838
+ const dirData = tx.getSync(inode.data);
839
+ if (!dirData) {
840
+ warn('Store is missing directory data: ' + inode.data);
841
+ continue;
842
+ }
843
+ const dirListing = decodeDirListing(dirData);
844
+ for (const [entryName, childIno] of Object.entries(dirListing)) {
845
+ queue.push([join(path, entryName), childIno]);
846
+ }
847
+ }
848
+ debug(`Added ${i} existing inode(s) from store`);
849
+ }
850
+ catch (e_22) {
851
+ env_22.error = e_22;
852
+ env_22.hasError = true;
853
+ }
854
+ finally {
855
+ __disposeResources(env_22);
856
+ }
857
+ }
784
858
  /**
785
859
  * Find an inode without using the ID tables
786
860
  */
@@ -859,7 +933,7 @@ export class StoreFS extends FileSystem {
859
933
  * @param data The data to store at the file's data node.
860
934
  */
861
935
  async commitNew(path, options, data) {
862
- const env_22 = { stack: [], error: void 0, hasError: false };
936
+ const env_23 = { stack: [], error: void 0, hasError: false };
863
937
  try {
864
938
  /*
865
939
  The root always exists.
@@ -868,7 +942,7 @@ export class StoreFS extends FileSystem {
868
942
  */
869
943
  if (path == '/')
870
944
  throw withErrno('EEXIST');
871
- const tx = __addDisposableResource(env_22, this.transaction(), true);
945
+ const tx = __addDisposableResource(env_23, this.transaction(), true);
872
946
  const { dir: parentPath, base: fname } = parse(path);
873
947
  const parent = await this.findInode(tx, parentPath);
874
948
  const listing = decodeDirListing((await tx.get(parent.data)) ?? _throw(withErrno('ENOENT')));
@@ -892,12 +966,12 @@ export class StoreFS extends FileSystem {
892
966
  await tx.commit();
893
967
  return inode;
894
968
  }
895
- catch (e_22) {
896
- env_22.error = e_22;
897
- env_22.hasError = true;
969
+ catch (e_23) {
970
+ env_23.error = e_23;
971
+ env_23.hasError = true;
898
972
  }
899
973
  finally {
900
- const result_12 = __disposeResources(env_22);
974
+ const result_12 = __disposeResources(env_23);
901
975
  if (result_12)
902
976
  await result_12;
903
977
  }
@@ -911,7 +985,7 @@ export class StoreFS extends FileSystem {
911
985
  * @return The Inode for the new file.
912
986
  */
913
987
  commitNewSync(path, options, data) {
914
- const env_23 = { stack: [], error: void 0, hasError: false };
988
+ const env_24 = { stack: [], error: void 0, hasError: false };
915
989
  try {
916
990
  /*
917
991
  The root always exists.
@@ -920,7 +994,7 @@ export class StoreFS extends FileSystem {
920
994
  */
921
995
  if (path == '/')
922
996
  throw withErrno('EEXIST');
923
- const tx = __addDisposableResource(env_23, this.transaction(), false);
997
+ const tx = __addDisposableResource(env_24, this.transaction(), false);
924
998
  const { dir: parentPath, base: fname } = parse(path);
925
999
  const parent = this.findInodeSync(tx, parentPath);
926
1000
  const listing = decodeDirListing(tx.getSync(parent.data) ?? _throw(withErrno('ENOENT')));
@@ -942,12 +1016,12 @@ export class StoreFS extends FileSystem {
942
1016
  tx.commitSync();
943
1017
  return inode;
944
1018
  }
945
- catch (e_23) {
946
- env_23.error = e_23;
947
- env_23.hasError = true;
1019
+ catch (e_24) {
1020
+ env_24.error = e_24;
1021
+ env_24.hasError = true;
948
1022
  }
949
1023
  finally {
950
- __disposeResources(env_23);
1024
+ __disposeResources(env_24);
951
1025
  }
952
1026
  }
953
1027
  /**
@@ -956,9 +1030,9 @@ export class StoreFS extends FileSystem {
956
1030
  * @param isDir Does the path belong to a directory, or a file?
957
1031
  */
958
1032
  async remove(path, isDir) {
959
- const env_24 = { stack: [], error: void 0, hasError: false };
1033
+ const env_25 = { stack: [], error: void 0, hasError: false };
960
1034
  try {
961
- const tx = __addDisposableResource(env_24, this.transaction(), true);
1035
+ const tx = __addDisposableResource(env_25, this.transaction(), true);
962
1036
  const { dir: parent, base: fileName } = parse(path), parentNode = await this.findInode(tx, parent), listing = decodeDirListing((await tx.get(parentNode.data)) ?? _throw(withErrno('ENOENT')));
963
1037
  if (!listing[fileName])
964
1038
  throw withErrno('ENOENT');
@@ -979,12 +1053,12 @@ export class StoreFS extends FileSystem {
979
1053
  }
980
1054
  await tx.commit();
981
1055
  }
982
- catch (e_24) {
983
- env_24.error = e_24;
984
- env_24.hasError = true;
1056
+ catch (e_25) {
1057
+ env_25.error = e_25;
1058
+ env_25.hasError = true;
985
1059
  }
986
1060
  finally {
987
- const result_13 = __disposeResources(env_24);
1061
+ const result_13 = __disposeResources(env_25);
988
1062
  if (result_13)
989
1063
  await result_13;
990
1064
  }
@@ -995,9 +1069,9 @@ export class StoreFS extends FileSystem {
995
1069
  * @param isDir Does the path belong to a directory, or a file?
996
1070
  */
997
1071
  removeSync(path, isDir) {
998
- const env_25 = { stack: [], error: void 0, hasError: false };
1072
+ const env_26 = { stack: [], error: void 0, hasError: false };
999
1073
  try {
1000
- const tx = __addDisposableResource(env_25, this.transaction(), false);
1074
+ const tx = __addDisposableResource(env_26, this.transaction(), false);
1001
1075
  const { dir: parent, base: fileName } = parse(path), parentNode = this.findInodeSync(tx, parent), listing = decodeDirListing(tx.getSync(parentNode.data) ?? _throw(withErrno('ENOENT'))), ino = listing[fileName];
1002
1076
  if (!ino)
1003
1077
  throw withErrno('ENOENT');
@@ -1017,12 +1091,12 @@ export class StoreFS extends FileSystem {
1017
1091
  }
1018
1092
  tx.commitSync();
1019
1093
  }
1020
- catch (e_25) {
1021
- env_25.error = e_25;
1022
- env_25.hasError = true;
1094
+ catch (e_26) {
1095
+ env_26.error = e_26;
1096
+ env_26.hasError = true;
1023
1097
  }
1024
1098
  finally {
1025
- __disposeResources(env_25);
1099
+ __disposeResources(env_26);
1026
1100
  }
1027
1101
  }
1028
1102
  }
package/dist/config.d.ts CHANGED
@@ -18,6 +18,13 @@ export type MountConfiguration<T extends Backend> = FilesystemOf<T> | BackendCon
18
18
  * @see MountConfiguration
19
19
  */
20
20
  export declare function resolveMountConfig<T extends Backend>(configuration: MountConfiguration<T>, _depth?: number): Promise<FilesystemOf<T>>;
21
+ /**
22
+ * @experimental
23
+ * Retrieve a file system with `configuration`.
24
+ * @category Backends and Configuration
25
+ * @see MountConfiguration
26
+ */
27
+ export declare function resolveMountConfigSync<T extends Backend>(configuration: MountConfiguration<T>, _depth?: number): FilesystemOf<T>;
21
28
  /**
22
29
  * An object mapping mount points to backends
23
30
  * @category Backends and Configuration
@@ -82,6 +89,12 @@ export interface Configuration<T extends ConfigMounts> extends SharedConfig {
82
89
  * @category Backends and Configuration
83
90
  */
84
91
  export declare function configureSingle<T extends Backend>(configuration: MountConfiguration<T>): Promise<void>;
92
+ /**
93
+ * @experimental
94
+ * Configures ZenFS with single mount point /
95
+ * @category Backends and Configuration
96
+ */
97
+ export declare function configureSingleSync<T extends Backend>(configuration: MountConfiguration<T>): void;
85
98
  /**
86
99
  * @category Backends and Configuration
87
100
  */
@@ -92,4 +105,11 @@ export declare function addDevice(driver: DeviceDriver, options?: object): Devic
92
105
  * @see Configuration
93
106
  */
94
107
  export declare function configure<T extends ConfigMounts>(configuration: Partial<Configuration<T>>): Promise<void>;
108
+ /**
109
+ * @experimental
110
+ * Configures ZenFS with `configuration`
111
+ * @category Backends and Configuration
112
+ * @see Configuration
113
+ */
114
+ export declare function configureSync<T extends ConfigMounts>(configuration: Partial<Configuration<T>>): void;
95
115
  export declare function sync(): Promise<void>;
package/dist/config.js CHANGED
@@ -5,6 +5,7 @@ import { createCredentials } from './internal/credentials.js';
5
5
  import { DeviceFS } from './internal/devices.js';
6
6
  import { FileSystem } from './internal/filesystem.js';
7
7
  import { exists, mkdir, stat } from './node/promises.js';
8
+ import { existsSync, mkdirSync, statSync } from './node/sync.js';
8
9
  import { _setAccessChecks } from './vfs/config.js';
9
10
  import { mount, mounts, umount } from './vfs/shared.js';
10
11
  /**
@@ -20,6 +21,9 @@ export function configureFileSystem(fs, config) {
20
21
  function isMountConfig(arg) {
21
22
  return isBackendConfig(arg) || isBackend(arg) || arg instanceof FileSystem;
22
23
  }
24
+ function isThenable(value) {
25
+ return typeof value?.then == 'function';
26
+ }
23
27
  /**
24
28
  * Retrieve a file system with `configuration`.
25
29
  * @category Backends and Configuration
@@ -60,6 +64,57 @@ export async function resolveMountConfig(configuration, _depth = 0) {
60
64
  await mount.ready();
61
65
  return mount;
62
66
  }
67
+ /**
68
+ * @experimental
69
+ * Retrieve a file system with `configuration`.
70
+ * @category Backends and Configuration
71
+ * @see MountConfiguration
72
+ */
73
+ export function resolveMountConfigSync(configuration, _depth = 0) {
74
+ if (typeof configuration !== 'object' || configuration == null) {
75
+ throw log.err(withErrno('EINVAL', 'Invalid options on mount configuration'));
76
+ }
77
+ if (!isMountConfig(configuration)) {
78
+ throw log.err(withErrno('EINVAL', 'Invalid mount configuration'));
79
+ }
80
+ if (configuration instanceof FileSystem) {
81
+ configuration.readySync();
82
+ return configuration;
83
+ }
84
+ if (isBackend(configuration)) {
85
+ configuration = { backend: configuration };
86
+ }
87
+ for (const [key, value] of Object.entries(configuration)) {
88
+ if (key == 'backend')
89
+ continue;
90
+ if (!isMountConfig(value))
91
+ continue;
92
+ log.info('Resolving nested mount configuration: ' + key);
93
+ if (_depth > 10) {
94
+ throw log.err(withErrno('EINVAL', 'Invalid configuration, too deep and possibly infinite'));
95
+ }
96
+ configuration[key] = resolveMountConfigSync(value, ++_depth);
97
+ }
98
+ const { backend } = configuration;
99
+ if (typeof backend.isAvailable == 'function') {
100
+ const available = backend.isAvailable(configuration);
101
+ if (isThenable(available)) {
102
+ throw log.err(withErrno('EAGAIN', 'Backend availability check would block: ' + backend.name));
103
+ }
104
+ if (!available) {
105
+ throw log.err(withErrno('EPERM', 'Backend not available: ' + backend.name));
106
+ }
107
+ }
108
+ checkOptions(backend, configuration);
109
+ const mountFs = backend.create(configuration);
110
+ if (isThenable(mountFs)) {
111
+ throw log.err(withErrno('EAGAIN', 'Backend initialization would block: ' + backend.name));
112
+ }
113
+ const resolved = mountFs;
114
+ configureFileSystem(resolved, configuration);
115
+ resolved.readySync();
116
+ return resolved;
117
+ }
63
118
  /**
64
119
  * Configures ZenFS with single mount point /
65
120
  * @category Backends and Configuration
@@ -72,6 +127,19 @@ export async function configureSingle(configuration) {
72
127
  umount('/');
73
128
  mount('/', resolved);
74
129
  }
130
+ /**
131
+ * @experimental
132
+ * Configures ZenFS with single mount point /
133
+ * @category Backends and Configuration
134
+ */
135
+ export function configureSingleSync(configuration) {
136
+ if (!isMountConfig(configuration)) {
137
+ throw new TypeError('Invalid single mount point configuration');
138
+ }
139
+ const resolved = resolveMountConfigSync(configuration);
140
+ umount('/');
141
+ mount('/', resolved);
142
+ }
75
143
  /**
76
144
  * Like `fs.mount`, but it also creates missing directories.
77
145
  * @privateRemarks
@@ -92,6 +160,33 @@ async function mountWithMkdir(path, fs) {
92
160
  }
93
161
  mount(path, fs);
94
162
  }
163
+ /**
164
+ * Like `fs.mount`, but it also creates missing directories.
165
+ * @privateRemarks
166
+ * This is implemented as a separate function to avoid a circular dependency between vfs/shared.ts and other vfs layer files.
167
+ * @internal
168
+ */
169
+ function mountWithMkdirSync(path, fs) {
170
+ if (path == '/') {
171
+ mount(path, fs);
172
+ return;
173
+ }
174
+ let stats = null;
175
+ try {
176
+ stats = statSync(path);
177
+ }
178
+ catch (error) {
179
+ if (error?.code != 'ENOENT')
180
+ throw error;
181
+ }
182
+ if (!stats) {
183
+ mkdirSync(path, { recursive: true });
184
+ }
185
+ else if (!stats.isDirectory()) {
186
+ throw withErrno('ENOTDIR', 'Missing directory at mount point: ' + path);
187
+ }
188
+ mount(path, fs);
189
+ }
95
190
  /**
96
191
  * @category Backends and Configuration
97
192
  */
@@ -149,6 +244,53 @@ export async function configure(configuration) {
149
244
  }
150
245
  }
151
246
  }
247
+ /**
248
+ * @experimental
249
+ * Configures ZenFS with `configuration`
250
+ * @category Backends and Configuration
251
+ * @see Configuration
252
+ */
253
+ export function configureSync(configuration) {
254
+ Object.assign(defaultContext.credentials, createCredentials({
255
+ uid: configuration.uid || 0,
256
+ gid: configuration.gid || 0,
257
+ }));
258
+ _setAccessChecks(!configuration.disableAccessChecks);
259
+ if (configuration.log)
260
+ log.configure(configuration.log);
261
+ if (configuration.mounts) {
262
+ for (const [_point, mountConfig] of Object.entries(configuration.mounts).sort(([a], [b]) => (a.length > b.length ? 1 : -1))) {
263
+ const point = _point.startsWith('/') ? _point : '/' + _point;
264
+ if (isBackendConfig(mountConfig)) {
265
+ mountConfig.disableAsyncCache ??= configuration.disableAsyncCache || false;
266
+ mountConfig.caseFold ??= configuration.caseFold;
267
+ }
268
+ if (point == '/')
269
+ umount('/');
270
+ mountWithMkdirSync(point, resolveMountConfigSync(mountConfig));
271
+ }
272
+ }
273
+ for (const fs of mounts.values()) {
274
+ configureFileSystem(fs, configuration);
275
+ }
276
+ if (configuration.addDevices && !mounts.has('/dev')) {
277
+ const devfs = new DeviceFS();
278
+ devfs.addDefaults();
279
+ devfs.readySync();
280
+ mountWithMkdirSync('/dev', devfs);
281
+ }
282
+ if (configuration.defaultDirectories) {
283
+ for (const dir of _defaultDirectories) {
284
+ if (existsSync(dir)) {
285
+ const stats = statSync(dir);
286
+ if (!stats.isDirectory())
287
+ log.warn('Default directory exists but is not a directory: ' + dir);
288
+ continue;
289
+ }
290
+ mkdirSync(dir);
291
+ }
292
+ }
293
+ }
152
294
  export async function sync() {
153
295
  for (const fs of mounts.values())
154
296
  await fs.sync();
package/dist/context.d.ts CHANGED
@@ -11,4 +11,4 @@ export declare const boundContexts: Map<number, BoundContext>;
11
11
  * Note that the default credentials of a bound context are copied from the global credentials.
12
12
  * @category Contexts
13
13
  */
14
- export declare function bindContext(this: void | null | FSContext, { root, pwd, credentials }?: ContextInit): BoundContext;
14
+ export declare function bindContext(this: V_Context, init?: ContextInit): BoundContext;
package/dist/context.js CHANGED
@@ -1,12 +1,10 @@
1
1
  // SPDX-License-Identifier: LGPL-3.0-or-later
2
+ import { UV } from 'kerium';
2
3
  import { bindFunctions } from 'utilium';
3
- import { defaultContext } from './internal/contexts.js';
4
- import { createCredentials } from './internal/credentials.js';
5
- import * as path from './path.js';
4
+ import { contextOf, createChildContext } from './internal/contexts.js';
6
5
  import * as fs from './node/index.js';
6
+ import * as path from './path.js';
7
7
  import * as xattr from './vfs/xattr.js';
8
- // 0 is reserved for the global/default context
9
- let _nextId = 1;
10
8
  /**
11
9
  * A map of all contexts.
12
10
  * @internal
@@ -18,19 +16,12 @@ export const boundContexts = new Map();
18
16
  * Note that the default credentials of a bound context are copied from the global credentials.
19
17
  * @category Contexts
20
18
  */
21
- export function bindContext({ root = this?.root || '/', pwd = this?.pwd || '/', credentials = structuredClone(defaultContext.credentials) } = {}) {
22
- const parent = this ?? defaultContext;
23
- const ctx = {
24
- id: _nextId++,
25
- root,
26
- pwd,
27
- credentials: createCredentials(credentials),
28
- descriptors: new Map(),
29
- parent,
30
- children: [],
31
- };
32
- const bound = {
33
- ...ctx,
19
+ export function bindContext(init = {}) {
20
+ const $ = contextOf(this);
21
+ if (!fs.statSync.call(this, $.root).isDirectory())
22
+ throw UV('ENOTDIR', { syscall: 'chroot', path: $.root });
23
+ const ctx = createChildContext($, init);
24
+ const bound = Object.assign(ctx, {
34
25
  fs: {
35
26
  ...bindFunctions(fs, ctx),
36
27
  promises: bindFunctions(fs.promises, ctx),
@@ -42,7 +33,7 @@ export function bindContext({ root = this?.root || '/', pwd = this?.pwd || '/',
42
33
  ctx.children.push(child);
43
34
  return child;
44
35
  },
45
- };
36
+ });
46
37
  boundContexts.set(ctx.id, bound);
47
38
  return bound;
48
39
  }
@@ -4,11 +4,18 @@ import type * as path from '../path.js';
4
4
  import type { Handle } from '../vfs/file.js';
5
5
  import type * as xattr from '../vfs/xattr.js';
6
6
  import type { Credentials, CredentialsInit } from './credentials.js';
7
+ /**
8
+ * Symbol used for context branding
9
+ * @internal @hidden
10
+ */
11
+ declare const kIsContext: unique symbol;
7
12
  /**
8
13
  * A context used for FS operations
9
14
  * @category Contexts
10
15
  */
11
16
  export interface FSContext {
17
+ /** The unique ID of the context */
18
+ readonly [kIsContext]: boolean;
12
19
  /** The unique ID of the context */
13
20
  readonly id: number;
14
21
  /**
@@ -22,16 +29,16 @@ export interface FSContext {
22
29
  /** The credentials of the context, used for access checks */
23
30
  readonly credentials: Credentials;
24
31
  /** A map of open file descriptors to their handles */
25
- descriptors: Map<number, Handle>;
32
+ readonly descriptors: Map<number, Handle>;
26
33
  /** The parent context, if any. */
27
- parent: V_Context;
34
+ readonly parent: FSContext | null;
28
35
  /** The child contexts */
29
- children: FSContext[];
36
+ readonly children: FSContext[];
30
37
  }
31
38
  /**
32
39
  * maybe an FS context
33
40
  */
34
- export type V_Context = void | null | (Partial<FSContext> & object);
41
+ export type V_Context = unknown;
35
42
  /**
36
43
  * Allows you to restrict operations to a specific root path and set of credentials.
37
44
  * @category Contexts
@@ -62,3 +69,16 @@ export interface ContextInit {
62
69
  * @category Contexts
63
70
  */
64
71
  export declare const defaultContext: FSContext;
72
+ export declare function contextOf($: unknown): FSContext;
73
+ /**
74
+ * Create a blank FS Context
75
+ * @internal
76
+ * @category Contexts
77
+ * @todo Make sure parent root can't be escaped
78
+ *
79
+ * This exists so that `kIsContext` is not exported and to make sure the context is "secure".
80
+ */
81
+ export declare function createChildContext(parent: FSContext, init?: ContextInit): FSContext & {
82
+ parent: FSContext;
83
+ };
84
+ export {};
@@ -1,10 +1,16 @@
1
1
  import { createCredentials } from './credentials.js';
2
+ /**
3
+ * Symbol used for context branding
4
+ * @internal @hidden
5
+ */
6
+ const kIsContext = Symbol('ZenFSContext');
2
7
  /**
3
8
  * The default/global context.
4
9
  * @internal @hidden
5
10
  * @category Contexts
6
11
  */
7
12
  export const defaultContext = {
13
+ [kIsContext]: true,
8
14
  id: 0,
9
15
  root: '/',
10
16
  pwd: '/',
@@ -13,3 +19,37 @@ export const defaultContext = {
13
19
  parent: null,
14
20
  children: [],
15
21
  };
22
+ export function contextOf($) {
23
+ return typeof $ === 'object' && $ !== null && kIsContext in $ ? $ : defaultContext;
24
+ }
25
+ // 0 is reserved for the global/default context
26
+ let _nextId = 1;
27
+ /**
28
+ * Create a blank FS Context
29
+ * @internal
30
+ * @category Contexts
31
+ * @todo Make sure parent root can't be escaped
32
+ *
33
+ * This exists so that `kIsContext` is not exported and to make sure the context is "secure".
34
+ */
35
+ export function createChildContext(parent, init = {}) {
36
+ const { root = parent.root, pwd = parent.pwd, credentials = structuredClone(parent.credentials) } = init;
37
+ const ctx = {
38
+ [kIsContext]: true,
39
+ id: _nextId++,
40
+ root,
41
+ pwd,
42
+ credentials: createCredentials(credentials),
43
+ descriptors: new Map(),
44
+ parent: parent,
45
+ children: [],
46
+ };
47
+ Object.defineProperties(ctx, {
48
+ id: { configurable: false, writable: false },
49
+ credentials: { configurable: false, writable: false },
50
+ descriptors: { configurable: false, writable: false },
51
+ parent: { configurable: false, writable: false },
52
+ children: { configurable: false, writable: false },
53
+ });
54
+ return ctx;
55
+ }
@@ -171,6 +171,7 @@ export declare abstract class FileSystem {
171
171
  */
172
172
  usage(): UsageInfo;
173
173
  ready(): Promise<void>;
174
+ readySync(): void;
174
175
  abstract rename(oldPath: string, newPath: string): Promise<void>;
175
176
  abstract renameSync(oldPath: string, newPath: string): void;
176
177
  abstract stat(path: string): Promise<InodeLike>;
@@ -1,3 +1,4 @@
1
+ import { withErrno } from 'kerium';
1
2
  const _chunkSize = 0x1000;
2
3
  /**
3
4
  * Provides a consistent and easy to use internal API.
@@ -61,6 +62,10 @@ export class FileSystem {
61
62
  };
62
63
  }
63
64
  async ready() { }
65
+ readySync() {
66
+ if (this.ready !== FileSystem.prototype.ready)
67
+ throw withErrno('EAGAIN');
68
+ }
64
69
  /**
65
70
  * Test whether or not `path` exists.
66
71
  */
@@ -39,9 +39,9 @@ import { sizeof } from 'memium';
39
39
  import { $from, field, struct, types as t } from 'memium/decorators';
40
40
  import { decodeUTF8, encodeUTF8, pick } from 'utilium';
41
41
  import { BufferView } from 'utilium/buffer.js';
42
- import { Stats } from '../node/stats.js';
43
42
  import * as c from '../constants.js';
44
- import { defaultContext } from './contexts.js';
43
+ import { Stats } from '../node/stats.js';
44
+ import { contextOf } from './contexts.js';
45
45
  /**
46
46
  * Root inode
47
47
  * @hidden
@@ -620,7 +620,7 @@ export function isFIFO(metadata) {
620
620
  * @internal
621
621
  */
622
622
  export function hasAccess($, inode, access) {
623
- const credentials = $?.credentials || defaultContext.credentials;
623
+ const { credentials } = contextOf($);
624
624
  if (isSymbolicLink(inode) || credentials.euid === 0 || credentials.egid === 0)
625
625
  return true;
626
626
  let perm = 0;
@@ -35,6 +35,7 @@ export declare class _MutexedFS<T extends FileSystem> implements FileSystem {
35
35
  set _uuid(value: UUID);
36
36
  get uuid(): UUID;
37
37
  ready(): Promise<void>;
38
+ readySync(): void;
38
39
  usage(): UsageInfo;
39
40
  /**
40
41
  * The current locks
@@ -115,6 +115,9 @@ export class _MutexedFS {
115
115
  async ready() {
116
116
  return await this._fs.ready();
117
117
  }
118
+ readySync() {
119
+ return this._fs.readySync();
120
+ }
118
121
  usage() {
119
122
  return this._fs.usage();
120
123
  }
package/dist/node/sync.js CHANGED
@@ -467,7 +467,7 @@ export function lutimesSync(path, atime, mtime) {
467
467
  lutimesSync;
468
468
  export function realpathSync(path, options) {
469
469
  const encoding = typeof options == 'string' ? options : (options?.encoding ?? 'utf8');
470
- path = normalizePath(path);
470
+ path = normalizePath(path, true);
471
471
  const { fullPath } = _sync.resolve(this, path);
472
472
  if (encoding == 'utf8' || encoding == 'utf-8')
473
473
  return fullPath;
package/dist/path.js CHANGED
@@ -1,5 +1,5 @@
1
1
  // SPDX-License-Identifier: LGPL-3.0-or-later
2
- import { defaultContext } from './internal/contexts.js';
2
+ import { contextOf } from './internal/contexts.js';
3
3
  import { globToRegex } from './utils.js';
4
4
  export const sep = '/';
5
5
  function validateObject(str, name) {
@@ -81,7 +81,7 @@ export function formatExt(ext) {
81
81
  }
82
82
  export function resolve(...parts) {
83
83
  let resolved = '';
84
- for (const part of [...parts.reverse(), this?.pwd ?? defaultContext.pwd]) {
84
+ for (const part of [...parts.reverse(), contextOf(this).pwd]) {
85
85
  if (!part?.length)
86
86
  continue;
87
87
  resolved = `${part}/${resolved}`;
@@ -334,7 +334,7 @@ export function format(pathObject) {
334
334
  return dir === pathObject.root ? `${dir}${base}` : `${dir}/${base}`;
335
335
  }
336
336
  export function parse(path) {
337
- const isAbsolute = path.startsWith('/');
337
+ const isAbsolute = path[0] === '/';
338
338
  const ret = { root: isAbsolute ? '/' : '', dir: '', base: '', ext: '', name: '' };
339
339
  if (path.length === 0)
340
340
  return ret;
package/dist/utils.d.ts CHANGED
@@ -2,6 +2,7 @@ import { type Exception } from 'kerium';
2
2
  import type * as fs from 'node:fs';
3
3
  import type { Worker as NodeWorker } from 'node:worker_threads';
4
4
  import { type OptionalTuple } from 'utilium';
5
+ import type { V_Context } from './internal/contexts.js';
5
6
  declare global {
6
7
  function atob(data: string): string;
7
8
  function btoa(data: string): string;
@@ -31,8 +32,9 @@ export declare function normalizeTime(time: fs.TimeLike): number;
31
32
  /**
32
33
  * Normalizes a path
33
34
  * @internal
35
+ * @todo clean this up and make it so `path.resolve` is only called when an explicit context is passed (i.e. `normalizePath(..., $)` to use `path.resolve`)
34
36
  */
35
- export declare function normalizePath(p: fs.PathLike, noResolve?: boolean): string;
37
+ export declare function normalizePath(this: V_Context, p: fs.PathLike, noResolve?: boolean): string;
36
38
  /**
37
39
  * Normalizes options
38
40
  * @param options options to normalize
package/dist/utils.js CHANGED
@@ -51,6 +51,7 @@ export function normalizeTime(time) {
51
51
  /**
52
52
  * Normalizes a path
53
53
  * @internal
54
+ * @todo clean this up and make it so `path.resolve` is only called when an explicit context is passed (i.e. `normalizePath(..., $)` to use `path.resolve`)
54
55
  */
55
56
  export function normalizePath(p, noResolve = false) {
56
57
  if (p instanceof URL) {
@@ -67,7 +68,7 @@ export function normalizePath(p, noResolve = false) {
67
68
  throw withErrno('EINVAL', 'Path can not be empty');
68
69
  p = p.replaceAll(/[/\\]+/g, '/');
69
70
  // Note: PWD is not resolved here, it is resolved later.
70
- return noResolve ? p : resolve(p);
71
+ return noResolve ? p : resolve.call(this, p);
71
72
  }
72
73
  /**
73
74
  * Normalizes options
package/dist/vfs/acl.js CHANGED
@@ -44,9 +44,9 @@ import { err } from 'kerium/log';
44
44
  import { packed, sizeof } from 'memium';
45
45
  import { $from, struct, types as t } from 'memium/decorators';
46
46
  import { BufferView } from 'utilium/buffer.js';
47
- import { defaultContext } from '../internal/contexts.js';
48
- import { Attributes } from '../internal/inode.js';
49
47
  import { R_OK, S_IRWXG, S_IRWXO, S_IRWXU, W_OK, X_OK } from '../constants.js';
48
+ import { contextOf } from '../internal/contexts.js';
49
+ import { Attributes } from '../internal/inode.js';
50
50
  import * as xattr from './xattr.js';
51
51
  const version = 2;
52
52
  export var Type;
@@ -206,7 +206,7 @@ export function check($, inode, access) {
206
206
  if (!shouldCheck)
207
207
  return true;
208
208
  inode.attributes ??= new Attributes();
209
- const { euid, egid } = $?.credentials ?? defaultContext.credentials;
209
+ const { euid, egid } = contextOf($).credentials;
210
210
  const data = inode.attributes.get('system.posix_acl_access');
211
211
  if (!data)
212
212
  return true;
package/dist/vfs/async.js CHANGED
@@ -1,7 +1,7 @@
1
1
  import { setUVMessage, UV } from 'kerium';
2
2
  import { decodeUTF8 } from 'utilium';
3
3
  import * as constants from '../constants.js';
4
- import { defaultContext } from '../internal/contexts.js';
4
+ import { contextOf } from '../internal/contexts.js';
5
5
  import { hasAccess, isDirectory, isSymbolicLink } from '../internal/inode.js';
6
6
  import { basename, dirname, join, parse, resolve as resolvePath } from '../path.js';
7
7
  import { normalizeMode, normalizePath } from '../utils.js';
@@ -17,6 +17,7 @@ import { emitChange } from './watchers.js';
17
17
  * @internal @hidden
18
18
  */
19
19
  export async function resolve($, path, preserveSymlinks, extra) {
20
+ path = resolvePath.call($, path);
20
21
  if (preserveSymlinks) {
21
22
  const resolved = resolveMount(path, $, extra);
22
23
  const stats = await resolved.fs.stat(resolved.path).catch(() => undefined);
@@ -74,7 +75,7 @@ export async function open($, path, opt) {
74
75
  throw UV('ENOTDIR', 'open', dirname(path));
75
76
  if (!opt.allowDirectory && mode & constants.S_IFDIR)
76
77
  throw UV('EISDIR', 'open', path);
77
- const { euid: uid, egid: gid } = $?.credentials ?? defaultContext.credentials;
78
+ const { euid: uid, egid: gid } = contextOf($).credentials;
78
79
  const inode = await fs.createFile(resolved, {
79
80
  mode,
80
81
  uid: parentStats.mode & constants.S_ISUID ? parentStats.uid : uid,
@@ -110,7 +111,7 @@ export async function readlink(path) {
110
111
  }
111
112
  export async function mkdir(path, options = {}) {
112
113
  path = normalizePath(path);
113
- const { euid: uid, egid: gid } = this?.credentials ?? defaultContext.credentials;
114
+ const { euid: uid, egid: gid } = contextOf(this).credentials;
114
115
  const { mode = 0o777, recursive } = options;
115
116
  const { fs, path: resolved } = resolveMount(path, this, { syscall: 'mkdir' });
116
117
  const __create = async (path, resolved, parent) => {
package/dist/vfs/file.js CHANGED
@@ -1,7 +1,7 @@
1
1
  // SPDX-License-Identifier: LGPL-3.0-or-later
2
2
  import { UV, withErrno } from 'kerium';
3
3
  import * as c from '../constants.js';
4
- import { defaultContext } from '../internal/contexts.js';
4
+ import { contextOf } from '../internal/contexts.js';
5
5
  import { _chown, InodeFlags, isBlockDevice, isCharacterDevice } from '../internal/inode.js';
6
6
  import '../polyfills.js';
7
7
  /**
@@ -371,7 +371,7 @@ export class Handle {
371
371
  * @internal @hidden
372
372
  */
373
373
  export function toFD(file) {
374
- const map = file.context?.descriptors ?? defaultContext.descriptors;
374
+ const map = contextOf(file.context).descriptors;
375
375
  const fd = Math.max(map.size ? Math.max(...map.keys()) + 1 : 0, 4);
376
376
  map.set(fd, file);
377
377
  return fd;
@@ -380,12 +380,12 @@ export function toFD(file) {
380
380
  * @internal @hidden
381
381
  */
382
382
  export function fromFD($, fd) {
383
- const map = $?.descriptors ?? defaultContext.descriptors;
383
+ const map = contextOf($).descriptors;
384
384
  const value = map.get(fd);
385
385
  if (!value)
386
386
  throw withErrno('EBADF');
387
387
  return value;
388
388
  }
389
389
  export function deleteFD($, fd) {
390
- return ($?.descriptors ?? defaultContext.descriptors).delete(fd);
390
+ return contextOf($).descriptors.delete(fd);
391
391
  }
@@ -4,7 +4,7 @@ import { Errno, Exception, UV, withErrno } from 'kerium';
4
4
  import { alert, debug, err, info, notice, warn } from 'kerium/log';
5
5
  import { InMemory } from '../backends/memory.js';
6
6
  import { size_max } from '../constants.js';
7
- import { defaultContext } from '../internal/contexts.js';
7
+ import { contextOf } from '../internal/contexts.js';
8
8
  import { credentialsAllowRoot } from '../internal/credentials.js';
9
9
  import { withExceptionContext } from '../internal/error.js';
10
10
  import { join, resolve } from '../path.js';
@@ -53,9 +53,10 @@ export function umount(mountPoint) {
53
53
  * @internal @hidden
54
54
  */
55
55
  export function resolveMount(path, ctx, extra) {
56
- const root = ctx?.root || defaultContext.root;
56
+ const { root } = contextOf(ctx);
57
57
  const _exceptionContext = { path, ...extra };
58
- path = normalizePath(join(root, path));
58
+ path = normalizePath(join(root, path), true);
59
+ path = resolve.call(ctx, path);
59
60
  const sortedMounts = [...mounts].sort((a, b) => (a[0].length > b[0].length ? -1 : 1)); // descending order of the string length
60
61
  for (const [mountPoint, fs] of sortedMounts) {
61
62
  // We know path is normalized, so it would be a substring of the mount point.
@@ -94,7 +95,7 @@ export function _statfs(fs, bigint) {
94
95
  * @category Backends and Configuration
95
96
  */
96
97
  export function chroot(path) {
97
- const $ = this ?? defaultContext;
98
+ const $ = contextOf(this);
98
99
  if (!credentialsAllowRoot($.credentials))
99
100
  throw withErrno('EPERM', 'Can not chroot() as non-root user');
100
101
  $.root ??= '/';
package/dist/vfs/sync.js CHANGED
@@ -1,7 +1,7 @@
1
1
  import { setUVMessage, UV } from 'kerium';
2
2
  import { decodeUTF8 } from 'utilium';
3
3
  import * as constants from '../constants.js';
4
- import { defaultContext } from '../internal/contexts.js';
4
+ import { contextOf } from '../internal/contexts.js';
5
5
  import { hasAccess, isDirectory, isSymbolicLink } from '../internal/inode.js';
6
6
  import { basename, dirname, join, parse, resolve as resolvePath } from '../path.js';
7
7
  import { normalizeMode, normalizePath } from '../utils.js';
@@ -18,6 +18,7 @@ import { emitChange } from './watchers.js';
18
18
  * @internal @hidden
19
19
  */
20
20
  export function resolve($, path, preserveSymlinks, extra) {
21
+ path = resolvePath.call($, path);
21
22
  /* Try to resolve it directly. If this works,
22
23
  that means we don't need to perform any resolution for parent directories. */
23
24
  try {
@@ -87,7 +88,7 @@ export function open(path, opt) {
87
88
  if (checkAccess && !hasAccess(this, parentStats, constants.W_OK)) {
88
89
  throw UV('EACCES', 'open', path);
89
90
  }
90
- const { euid: uid, egid: gid } = this?.credentials ?? defaultContext.credentials;
91
+ const { euid: uid, egid: gid } = contextOf(this).credentials;
91
92
  const inode = fs.createFileSync(resolved, {
92
93
  mode,
93
94
  uid: parentStats.mode & constants.S_ISUID ? parentStats.uid : uid,
@@ -124,7 +125,7 @@ export function readlink(path) {
124
125
  export function mkdir(path, options = {}) {
125
126
  path = normalizePath(path);
126
127
  const { fs, path: resolved } = resolve(this, path);
127
- const { euid: uid, egid: gid } = this?.credentials ?? defaultContext.credentials;
128
+ const { euid: uid, egid: gid } = contextOf(this).credentials;
128
129
  const { mode = 0o777, recursive } = options;
129
130
  const __create = (path, resolved, parent) => {
130
131
  if (checkAccess && !hasAccess(this, parent, constants.W_OK))
@@ -75,5 +75,5 @@ export declare function removeWatcher(path: string, watcher: FSWatcher): void;
75
75
  /**
76
76
  * @internal @hidden
77
77
  */
78
- export declare function emitChange($: V_Context, eventType: fs.WatchEventType, filename: string): void;
78
+ export declare function emitChange(context: V_Context, eventType: fs.WatchEventType, filename: string): void;
79
79
  export {};
@@ -1,9 +1,10 @@
1
1
  import { EventEmitter } from 'eventemitter3';
2
2
  import { UV } from 'kerium';
3
- import { basename, dirname, join, relative } from '../path.js';
4
- import { normalizePath } from '../utils.js';
3
+ import { contextOf } from '../internal/contexts.js';
5
4
  import { isStatsEqual } from '../node/stats.js';
6
5
  import { statSync } from '../node/sync.js';
6
+ import { basename, dirname, join, relative } from '../path.js';
7
+ import { normalizePath } from '../utils.js';
7
8
  /**
8
9
  * Base class for file system watchers.
9
10
  * Provides event handling capabilities for watching file system changes.
@@ -61,9 +62,10 @@ export class FSWatcher extends Watcher {
61
62
  options;
62
63
  realpath;
63
64
  constructor(context, path, options) {
64
- super(context, path);
65
+ const $ = contextOf(context);
66
+ super($, path);
65
67
  this.options = options;
66
- this.realpath = context?.root ? join(context.root, path) : path;
68
+ this.realpath = join($.root, path);
67
69
  addWatcher(this.realpath, this);
68
70
  }
69
71
  close() {
@@ -145,7 +147,8 @@ export function removeWatcher(path, watcher) {
145
147
  /**
146
148
  * @internal @hidden
147
149
  */
148
- export function emitChange($, eventType, filename) {
150
+ export function emitChange(context, eventType, filename) {
151
+ const $ = contextOf(context);
149
152
  if ($)
150
153
  filename = join($.root ?? '/', filename);
151
154
  filename = normalizePath(filename);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@zenfs/core",
3
- "version": "2.4.3",
3
+ "version": "2.5.0",
4
4
  "description": "A filesystem, anywhere",
5
5
  "funding": {
6
6
  "type": "individual",
@@ -0,0 +1,57 @@
1
+ // SPDX-License-Identifier: LGPL-3.0-or-later
2
+ import { configureSingleSync, configureSync, fs, InMemory, mounts, SingleBuffer, type Backend } from '@zenfs/core';
3
+ import { Errno } from 'kerium';
4
+ import assert from 'node:assert/strict';
5
+ import { suite, test } from 'node:test';
6
+
7
+ const AsyncBackend = {
8
+ name: 'AsyncBackend',
9
+ options: {},
10
+ async create() {
11
+ await Promise.resolve();
12
+ return InMemory.create({ label: 'async-backend' });
13
+ },
14
+ } satisfies Backend;
15
+
16
+ suite('Sync configuration', () => {
17
+ test('configureSingleSync mounts root synchronously', () => {
18
+ configureSingleSync({ backend: InMemory, label: 'sync-root' });
19
+ assert.equal(mounts.get('/')?.label, 'sync-root');
20
+
21
+ fs.writeFileSync('/sync-file', 'sync');
22
+ assert.equal(fs.readFileSync('/sync-file', 'utf8'), 'sync');
23
+ });
24
+
25
+ test('configureSync mounts additional directories', () => {
26
+ configureSync({
27
+ mounts: {
28
+ tmp: { backend: InMemory, label: 'sync-tmp' },
29
+ },
30
+ });
31
+
32
+ assert.ok(mounts.has('/tmp'));
33
+ fs.writeFileSync('/tmp/sync.txt', 'ok');
34
+ assert.equal(fs.readFileSync('/tmp/sync.txt', 'utf8'), 'ok');
35
+
36
+ fs.umount('/tmp');
37
+ fs.rmSync('/tmp', { recursive: true, force: true });
38
+ });
39
+
40
+ test('configureSync rejects asynchronous backends', () => {
41
+ assert.throws(
42
+ () =>
43
+ configureSync({
44
+ mounts: { '/': { backend: AsyncBackend } },
45
+ }),
46
+ { errno: Errno.EAGAIN }
47
+ );
48
+ });
49
+
50
+ test('configureSingleSync works with SingleBuffer', () => {
51
+ const buffer = new ArrayBuffer(0x20000);
52
+ configureSingleSync({ backend: SingleBuffer, buffer });
53
+
54
+ fs.writeFileSync('/sb.txt', 'single-buffer');
55
+ assert.equal(fs.readFileSync('/sb.txt', 'utf8'), 'single-buffer');
56
+ });
57
+ });
@@ -60,8 +60,7 @@ suite('Context', () => {
60
60
  await promise;
61
61
  });
62
62
 
63
- test('Path resolution of / with context root and mount point being the same', async () => {
64
- // @zenfs/core#226
63
+ test('Path resolution of / with context root and mount point being the same #226', async () => {
65
64
  await configure({
66
65
  mounts: { '/bananas': InMemory },
67
66
  });
@@ -73,8 +72,7 @@ suite('Context', () => {
73
72
  assert.deepEqual(bananas.fs.readdirSync('/'), ['yellow']);
74
73
  });
75
74
 
76
- test('Different working directory', { todo: true }, () => {
77
- // @zenfs/core#263
75
+ test('Different working directory #263', () => {
78
76
  ctx.mkdirSync('/test');
79
77
  context.pwd = '/test';
80
78
 
@@ -19,8 +19,7 @@ suite('Links', () => {
19
19
  assert(stats.isSymbolicLink());
20
20
  });
21
21
 
22
- test('lstat file inside symlinked directory', async () => {
23
- // @zenfs/core#241
22
+ test('lstat file inside symlinked directory #241', async () => {
24
23
  await fs.promises.mkdir('/a');
25
24
  await fs.promises.writeFile('/a/hello.txt', 'hello world');
26
25
  await fs.promises.symlink('/a', '/b');
@@ -70,8 +70,7 @@ suite('read', () => {
70
70
  assert.equal(bytesRead, expected.length);
71
71
  });
72
72
 
73
- test('read using callback API', async () => {
74
- // @zenfs/core#239
73
+ test('read using callback API #239', async () => {
75
74
  const path = '/text.txt';
76
75
 
77
76
  fs.writeFileSync(path, 'hello world');