|
@@ -16,7 +16,8 @@ import java.io.IOException;
|
|
|
import java.nio.file.Files;
|
|
|
import java.nio.file.Path;
|
|
|
import java.util.List;
|
|
|
-import java.util.concurrent.atomic.AtomicReference;
|
|
|
+import java.util.Map;
|
|
|
+import java.util.Set;
|
|
|
|
|
|
import static org.cryptomator.integrations.mount.MountCapability.MOUNT_AS_DRIVE_LETTER;
|
|
|
import static org.cryptomator.integrations.mount.MountCapability.MOUNT_TO_EXISTING_DIR;
|
|
@@ -27,12 +28,17 @@ import static org.cryptomator.integrations.mount.MountCapability.UNMOUNT_FORCED;
|
|
|
@Singleton
|
|
|
public class Mounter {
|
|
|
|
|
|
- private static final List<String> CONFLICTING_MOUNT_SERVICES = List.of("org.cryptomator.frontend.fuse.mount.MacFuseMountProvider", "org.cryptomator.frontend.fuse.mount.FuseTMountProvider");
|
|
|
+ // mount providers (key) can not be used if any of the conflicting mount providers (values) are already in use
|
|
|
+ private static final Map<String, Set<String>> CONFLICTING_MOUNT_SERVICES = Map.of(
|
|
|
+ "org.cryptomator.frontend.fuse.mount.MacFuseMountProvider", Set.of("org.cryptomator.frontend.fuse.mount.FuseTMountProvider"),
|
|
|
+ "org.cryptomator.frontend.fuse.mount.FuseTMountProvider", Set.of("org.cryptomator.frontend.fuse.mount.MacFuseMountProvider")
|
|
|
+ );
|
|
|
+
|
|
|
private final Environment env;
|
|
|
private final Settings settings;
|
|
|
private final WindowsDriveLetters driveLetters;
|
|
|
private final List<MountService> mountProviders;
|
|
|
- private final AtomicReference<MountService> firstUsedProblematicFuseMountService;
|
|
|
+ private final Set<MountService> usedMountServices;
|
|
|
private final ObservableValue<MountService> defaultMountService;
|
|
|
|
|
|
@Inject
|
|
@@ -40,13 +46,13 @@ public class Mounter {
|
|
|
Settings settings, //
|
|
|
WindowsDriveLetters driveLetters, //
|
|
|
List<MountService> mountProviders, //
|
|
|
- @Named("FUPFMS") AtomicReference<MountService> firstUsedProblematicFuseMountService, //
|
|
|
+ @Named("usedMountServices") Set<MountService> usedMountServices, //
|
|
|
ObservableValue<MountService> defaultMountService) {
|
|
|
this.env = env;
|
|
|
this.settings = settings;
|
|
|
this.driveLetters = driveLetters;
|
|
|
this.mountProviders = mountProviders;
|
|
|
- this.firstUsedProblematicFuseMountService = firstUsedProblematicFuseMountService;
|
|
|
+ this.usedMountServices = usedMountServices;
|
|
|
this.defaultMountService = defaultMountService;
|
|
|
}
|
|
|
|
|
@@ -149,23 +155,24 @@ public class Mounter {
|
|
|
}
|
|
|
|
|
|
public MountHandle mount(VaultSettings vaultSettings, Path cryptoFsRoot) throws IOException, MountFailedException {
|
|
|
- var selMntServ = mountProviders.stream().filter(s -> s.getClass().getName().equals(vaultSettings.mountService.getValue())).findFirst().orElse(defaultMountService.getValue());
|
|
|
+ var mountService = mountProviders.stream().filter(s -> s.getClass().getName().equals(vaultSettings.mountService.getValue())).findFirst().orElse(defaultMountService.getValue());
|
|
|
|
|
|
- var targetIsProblematicFuse = isProblematicFuseService(selMntServ);
|
|
|
- if (targetIsProblematicFuse && firstUsedProblematicFuseMountService.get() == null) {
|
|
|
- firstUsedProblematicFuseMountService.set(selMntServ);
|
|
|
- } else if (targetIsProblematicFuse && !firstUsedProblematicFuseMountService.get().equals(selMntServ)) {
|
|
|
+ if (isConflictingMountService(mountService)) {
|
|
|
+ // TODO: neither message displayed in UI nor exception is specific to FUSE, so rename this class
|
|
|
throw new FuseRestartRequiredException("Failed to mount the specified mount service.");
|
|
|
}
|
|
|
|
|
|
- var builder = selMntServ.forFileSystem(cryptoFsRoot);
|
|
|
- var internal = new SettledMounter(selMntServ, builder, vaultSettings);
|
|
|
+ usedMountServices.add(mountService);
|
|
|
+
|
|
|
+ var builder = mountService.forFileSystem(cryptoFsRoot);
|
|
|
+ var internal = new SettledMounter(mountService, builder, vaultSettings); // FIXME: no need for an inner class
|
|
|
var cleanup = internal.prepare();
|
|
|
- return new MountHandle(builder.mount(), selMntServ.hasCapability(UNMOUNT_FORCED), cleanup);
|
|
|
+ return new MountHandle(builder.mount(), mountService.hasCapability(UNMOUNT_FORCED), cleanup);
|
|
|
}
|
|
|
|
|
|
- public static boolean isProblematicFuseService(MountService service) {
|
|
|
- return CONFLICTING_MOUNT_SERVICES.contains(service.getClass().getName());
|
|
|
+ public boolean isConflictingMountService(MountService service) {
|
|
|
+ var conflictingServices = CONFLICTING_MOUNT_SERVICES.getOrDefault(service.getClass().getName(), Set.of());
|
|
|
+ return usedMountServices.stream().map(MountService::getClass).map(Class::getName).anyMatch(conflictingServices::contains);
|
|
|
}
|
|
|
|
|
|
public record MountHandle(Mount mountObj, boolean supportsUnmountForced, Runnable specialCleanup) {
|