Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1105193
  • 博文数量: 170
  • 博客积分: 1603
  • 博客等级: 上尉
  • 技术积分: 1897
  • 用 户 组: 普通用户
  • 注册时间: 2010-07-09 15:54
文章分类

全部博文(170)

文章存档

2016年(27)

2015年(21)

2014年(27)

2013年(21)

2012年(7)

2011年(67)

我的朋友

分类: Python/Ruby

2011-09-28 17:02:39

1年多前就看过相关内容了,当时python还不太会用看不懂别人写的代码,最近闲着又翻出来看看顺便解读下pyinotify的代码

使用源自于
http://blog.daviesliu.net/2008/04/24/sync/

这里的代码有2个错误,一个是base多定义了一次,另外就是有几行缩进好像有点问题,需要自己控制下缩进

一行一行解读
  1. flags = IN_CLOSE_WRITE|IN_CREATE|IN_Q_OVERFLOW
这里flags的值是int行的,这里原来我半天没看懂。
如果写成
flags = pyinotify.IN_DELETE | pyinotify.IN_CREATE就好懂多了,这里用几个监控的类型的int值进行逻辑运算成监控需要监控的改变类型的数值具体数值怎么定义可以看看pyinotify.py文件中的class EventsCodes:中定义FLAG_COLLECTIONS的数值

dirs = {}
定义一个空的字典
base = '/log/lighttpd/cache/images/icon/u241'
这里定义了需要监控的文件夹,注意上面连接代码里有个base,自然是原作者忘记注释了其中一个,我们改成/tmp来测试

class UpdateParentDir(ProcessEvent):这里之前看不懂,特别是下面的process_IN_CLOSE_WRITE(self, event):,都不知道event哪里来的因为以前学c么什么函数重载,类的重载。这里其实就是什么派生重载子类而已

我们先看在pyinotify.py里看ProcessEvent这个类,这个类继承自_ProcessEvent这个类...,于是先去瞅瞅_ProcessEvent这个类
_ProcessEvent这个类没有init方法,只有__call__方法,call方法相当于重载了(),具体我们可以测试,我们先call方法里加入print "++++++++++++"
到最后我们再看结果,先跳过

继续看ProcessEvent类的init方法
  1. def __init__(self, pevent=None, **kargs):
  2.     self.pevent = pevent
  3.     self.my_init(**kargs)
这个init方法也很简单,不赋值也没有问题self.my_init(**kargs)是留给我们自己写方法扩展的,可以不理会。所以这个init方法也没什么好看鸟。

我们可以直接看别人重载的方法在源代码pyinotify.py中的样子
  1. def process_IN_Q_OVERFLOW(self, event):
  2.     log.warning('Event queue overflowed.')
  3.     
  4. def process_default(self, event):
  5.     pass
非常明了,不重载之前,原函数只是把对应变化写入log中,重载之后我们可以根据变化做自己想要的操作,比如备份改变的文件,或做同步操作之类。

现在重点是那个event,init里有说明type event: Event instance,不过UpdateParentDir还没开始调用,所以我们先放下Event模块不看。

先看下面的wm = WatchManager()
  1. class WatchManager:
  2.     def __init__(self, exclude_filter=lambda path: False):
  3.     self._fd = self._inotify_wrapper.inotify_init()
init里主要看self._fd
这个fd是返回inotify监控的节点滴,这里调用了c封装的_inotify_wrapper,应该是初始化监控对象
WatchManager在监控代码中也没传参数,看到后面代码这个类还是通过类的add_watch方法传入内容的,看add_watch方法
  1. def add_watch(self, path, mask, proc_fun=None, rec=False,
  2.                   auto_add=False, do_glob=False, quiet=True,
  3.                   exclude_filter=None):
这个方法主要是把path(也是就代码中的base指定的目录)格式化后传入,然后返回个path中内容的字典,监控工作还是没开始。
  1. wd = ret_[rpath] = self.__add_watch(rpath, mask,
  2.                                                             proc_fun,
  3.                                                             auto_add,
  4.                                                             exclude_filter)
add_watch里还调用了__add_watch,__add_watch里面又调用了watch方法,这里主要是从_inotify_wrapper这个c封装中获得inotify的对象

现在可以看把WatchManager和ProcessEvent联系起来的Notifier类了
  1. class Notifier:
  2.     def __init__(self, watch_manager, default_proc_fun=None, read_freq=0,
  3.                  threshold=0, timeout=None):
  4.         """        
  5.         @type watch_manager: WatchManager instance        
  6.         @param default_proc_fun: Default processing method. If None, a new
  7.                                  instance of PrintAllEvents will be assigned.        
  8.         @type default_proc_fun: instance of ProcessEvent
  9.          """
  10.         # Watch Manager instance
  11.         self._watch_manager = watch_manager
  12.         # File descriptor
  13.         self._fd = self._watch_manager.get_fd()
  14.         # Poll object and registration
  15.         self._pollobj = select.poll()
  16.         self._pollobj.register(self._fd, select.POLLIN)
  17.         # This pipe is correctely initialized and used by ThreadedNotifier
  18.         self._pipe = (-1, -1)
  19.         # Event queue
  20.         self._eventq = deque()
  21.         # System processing functor, common to all events
  22.         self._sys_proc_fun = _SysProcessEvent(self._watch_manager, self)
  23.         # Default processing method
  24.         self._default_proc_fun = default_proc_fun
  25.         if default_proc_fun is None:
  26.             self._default_proc_fun = PrintAllEvents()
  27.         # Loop parameters
  28.         self._read_freq = read_freq
  29.         self._threshold = threshold
  30.         self._timeout = timeout
  31.         # Coalesce events option
  32.         self._coalesce = False
  33.         # set of str(raw_event), only used when coalesce option is True
  34.         self._eventset = set()
Notifier类传入一个wm类和ProcessEvent类,我们来自己看看init方法代码

  1. self._fd = self._watch_manager.get_fd()
这里看上面WatchManager类的self._fd

  1. self._pollobj = select.poll()
这里就是重点了,poll模型,写过socket的应该知道,异步非阻塞,这里可以看出处理消息方式了
shell中使用while read,这里使用poll模型,效率差距立判了。
python2.7以上才有epoll模型,高版本pyinotify应该会使用epoll模型,如果python版本高,应该自己可以修改这里的代码来使用epoll

  1. self._sys_proc_fun = _SysProcessEvent(self._watch_manager, self)
再调用_SysProcessEvent类,这个类是ProcessEvent的父类,到下面才好理解这个是干嘛的 

  1. self._default_proc_fun = default_proc_fun
这里就是我们传入的ProcessEvent类,self._default_proc_fun和self._sys_proc_fun分别在什么情况下用要下面代码才看得出来

init里其他的就不说了,定义队列超时时间之类
ok,到Notifier类初始化完毕,我们的监控都还么正式开始,只是打开了入口(即self._fd = self._inotify_wrapper.inotify_init())
至于dirs.update(wm.add_watch(base, flags, rec=True, auto_add=True))这里当dirs不存在好了,因为wm.add_watch方法会返回一个监控目录根目录内容的字典
所以用了个dirs来装返回值,其实没有也无所谓。

正式开始是在notifier.loop() 
我们来看Notifier类的loop方法
  1. def loop(self, callback=None, daemonize=False, **args):
  2.         """
  3.         Events are read only one time every min(read_freq, timeout)
  4.         seconds at best and only if the size to read is >= threshold.
  5.         After this method returns it must not be called again for the same
  6.         instance.

  7.         @param callback: Functor called after each event processing iteration.
  8.                          Expects to receive the notifier object (self) as first
  9.                          parameter. If this function returns True the loop is
  10.                          immediately terminated otherwise the loop method keeps
  11.                          looping.
  12.         @type callback: callable object or function
  13.         @param daemonize: This thread is daemonized if set to True.
  14.         @type daemonize: boolean
  15.         @param args: Optional and relevant only if daemonize is True. Remaining
  16.                      keyworded arguments are directly passed to daemonize see
  17.                      __daemonize() method. If pid_file=None or is set to a
  18.                      pathname the caller must ensure the file does not exist
  19.                      before this method is called otherwise an exception
  20.                      pyinotify.NotifierError will be raised. If pid_file=False
  21.                      it is still daemonized but the pid is not written in any
  22.                      file.
  23.         @type args: various
  24.         """
  25.         if daemonize:
  26.             self.__daemonize(**args)

  27.         # Read and process events forever
  28.         while 1:
  29.             try:
  30.                 self.process_events()
  31.                 if (callback is not None) and (callback(self) is True):
  32.                     break
  33.                 ref_time = time.time()
  34.                 # check_events is blocking
  35.                 if self.check_events():
  36.                     self._sleep(ref_time)
  37.                     self.read_events()
  38.             except KeyboardInterrupt:
  39.                 # Stop monitoring if sigint is caught (Control-C).
  40.                 log.debug('Pyinotify stops monitoring.')
  41.                 break
  42.         # Close internals
  43.         self.stop()
我们一行一行的看loop的代码
loop传入的参数daemonize可以看daemonize方法,这个其实就是把进程变守护进程的方法,这个和普通守护进程方法差不多
无非就是fork两次setsid父进程退出一类
callback也没什么大用貌似用来自定义的,跳过
下面终于看见while 1了我们的监控开始
 
loop的循环里首先try process_events方法,于是去看process_events方法
  1. def process_events(self):
  2.         """
  3.         Routine for processing events from queue by calling their
  4.         associated proccessing method (an instance of ProcessEvent).
  5.         It also does internal processings, to keep the system updated.
  6.         """
  7.         while self._eventq:
  8.             raw_event = self._eventq.popleft() # pop next event
  9.             watch_ = self._watch_manager.get_watch(raw_event.wd)
  10.             if watch_ is None:
  11.                 # Not really sure how we ended up here, nor how we should
  12.                 # handle these types of events and if it is appropriate to
  13.                 # completly skip them (like we are doing here).
  14.                 log.warning("Unable to retrieve Watch object associated to %s",
  15.                             repr(raw_event))
  16.                 continue
  17.             revent = self._sys_proc_fun(raw_event) # system processings
  18.             if watch_ and watch_.proc_fun:
  19.                 watch_.proc_fun(revent) # user processings
  20.             else:
  21.                 self._default_proc_fun(revent)
  22.         self._sys_proc_fun.cleanup() # remove olds MOVED_* events records
  23.         if self._coalesce:
  24.             self._eventset.clear()
由于第一次执行的时候self._eventq队列里肯定没东西是空的我们先跳过process_events看loop方法后面的代码
  1. if (callback is not None) and (callback(self) is True):
  2.     break
  3. ref_time = time.time()
这两行简单,跳过
if self.check_events():
这里可以看check_events():方法,可以看见
  1. def check_events(self, timeout=None):
  2.         """
  3.         Check for new events available to read, blocks up to timeout
  4.         milliseconds.

  5.         @param timeout: If specified it overrides the corresponding instance
  6.                         attribute _timeout.
  7.         @type timeout: int

  8.         @return: New events to read.
  9.         @rtype: bool
  10.         """
  11.         while True:
  12.             try:
  13.                 # blocks up to 'timeout' milliseconds
  14.                 if timeout is None:
  15.                     timeout = self._timeout
  16.                 ret = self._pollobj.poll(timeout)
  17.             except select.error, err:
  18.                 if err[0] == errno.EINTR:
  19.                     continue # interrupted, retry
  20.                 else:
  21.                     raise
  22.             else:
  23.                 break

  24.         if not ret or (self._pipe[0] == ret[0][0]):
  25.             return False
  26.         # only one fd is polled
  27.         return ret[0][1] & select.POLLIN
check_events就是处理poll的,poll具体怎么用可以google的poll用法,我只用过select所以不太熟悉poll,但是原理是一样的
其实loop里的while 1这里就相当于我以前写select的
  1. while True:
  2.             GetList,SendList,ErrList = select.select([self.socket,],[],[],0)
  3.             if len(GetList) > 0:
  4.                 try:
  5.                     curSock,userAddr = self.socket.accept()
  6. # curSock.settimeout(15)
  7.                     self.socket_pool.append(curSock)
  8.                     print "get new socket"
  9.                 except:
  10.                     print "error or time out"

  11.             get_sock_pool,send_sock_pool,err_sock_pool = select.select(self.socket_pool,[],[],0)
这样的代码了,不停的扫描socket缓冲区,当返回值大于0就接受数据。
loop也是一样,不过用的是poll模型加deque队列(deque队列其实和list差不多,不过比list灵活,可以从两端弹出、插入数值,list只能从后面插)

check完了就read
  1. def read_events(self):
  2.         """
  3.         Read events from device, build _RawEvents, and enqueue them.
  4.         """
  5.         buf_ = array.array('i', [0])
  6.         # get event queue size
  7.         if fcntl.ioctl(self._fd, termios.FIONREAD, buf_, 1) == -1:
  8.             return
  9.         queue_size = buf_[0]
  10.         if queue_size < self._threshold:
  11.             log.debug('(fd: %d) %d bytes available to read but threshold is '
  12.                       'fixed to %d bytes', self._fd, queue_size,
  13.                       self._threshold)
  14.             return

  15.         try:
  16.             # Read content from file
  17.             r = os.read(self._fd, queue_size)
  18.         except Exception, msg:
  19.             raise NotifierError(msg)
  20.         log.debug('Event queue size: %d', queue_size)
  21.         rsum = 0 # counter
  22.         while rsum < queue_size:
  23.             s_size = 16
  24.             # Retrieve wd, mask, cookie and fname_len
  25.             wd, mask, cookie, fname_len = struct.unpack('iIII',
  26.                                                         r[rsum:rsum+s_size])
  27.             # Retrieve name
  28.             fname, = struct.unpack('%ds' % fname_len,
  29.                                    r[rsum + s_size:rsum + s_size + fname_len])
  30.             rawevent = _RawEvent(wd, mask, cookie, fname)
  31.             if self._coalesce:
  32.                 # Only enqueue new (unique) events.
  33.                 raweventstr = str(rawevent)
  34.                 if raweventstr not in self._eventset:
  35.                     self._eventset.add(raweventstr)
  36.                     self._eventq.append(rawevent)
  37.             else:
  38.                 self._eventq.append(rawevent)
  39.             rsum += s_size + fname_len
这两个函数都和poll有关,看不懂无所谓,但是大概可以知道这里就是poll使得self._eventq()中有数据(就是把变化的内容传入队列)
read_events后process_events函数就能执行了。
看process_events中有数据以后的执行方式

当self._eventq有内容内容以后


  1. raw_event = self._eventq.popleft()
弹出队列中的内容,这个raw_event就是Event类


  1. watch_ = self._watch_manager.get_watch(raw_event.wd)
通过刚才弹出的对象返回inotify对象


  1. if watch_ is None:
通过上面返回值判断是否被监控,这个判断保险用的,当作不存在


  1. revent = self._sys_proc_fun(raw_event)
创建个叫revent的_SysProcessEvent类,这个类传入的参数raw_event是个event对象,这个event就是变动的文件的相关信息


  1. if watch_ and watch_.proc_fun:
  2.     watch_.proc_fun(revent)
  3. else:
  4.     self._default_proc_fun(revent)
判断是否把这个类丢给_default_proc_fun。
这里执行了self._default_proc_fun(revent)的话,我们在UpdateParentDir(ProcessEvent):里的方法就会执行   

_SysProcessEvent有啥用?其实没啥用,这个类就是定义了默认的各种mark的处理方式让传入的类去继承而已。
在_SysProcessEvent的process_IN_CREATE方法里加入
print "=============="


我们拿改好的代码执行下,当创建一个文件时,出现下面打印(请无视掉caonima....谢谢)
  1. #!/usr/bin/python

  2. from pyinotify import *
  3. import os, os.path

  4. flags = IN_CLOSE_WRITE|IN_CREATE|IN_Q_OVERFLOW
  5. dirs = {}
  6. base = '/log/lighttpd/cache/images/icon/u241'
  7. base = 'tmp'

  8. class UpdateParentDir(ProcessEvent):
  9.     def process_IN_CLOSE_WRITE(self, event):
  10.         print 'modify', event.pathname
  11.         mtime = os.path.getmtime(event.pathname)
  12.         p = event.path
  13.         while p.startswith(base):
  14.             m = os.path.getmtime(p)
  15.             if m < mtime:
  16.              print 'update', p
  17.                 os.utime(p, (mtime,mtime))
  18.             elif m > mtime:
  19.                 mtime = m
  20.             p = os.path.dirname(p)
  21.     
  22.     process_IN_MODIFY = process_IN_CLOSE_WRITE

  23.     def process_IN_Q_OVERFLOW(self, event):
  24.         print 'over flow'
  25.         max_queued_events.value *= 2

  26.     def process_default(self, event):
  27.         pass

  28. wm = WatchManager()
  29. notifier = Notifier(wm, UpdateParentDir())
  30. dirs.update(wm.add_watch(base, flags, rec=True, auto_add=True))

  31. notifier.loop()
{'/tmp': 1, '/tmp/.font-unix': 4, '/tmp/.wapi': 5, '/tmp/hsperfdata_root': 2, '/tmp/.ICE-unix': 3}
+++++++++++call+++caonima++++++++++++++
============sys========caonimai============
+++++++++++call+++caonima++++++++++++++
+++++++++++call+++caonima++++++++++++++
+++++++++++call+++caonima++++++++++++++
modify /tmp/14


分析下可以知道,继承_ProcessEvent类的时候先call了一次
在process_events方法中有revent = self._sys_proc_fun(raw_event),所以创建创的时候打印了"========"
所以后面self._default_proc_fun(revent)重载的之前,_ProcessEvent中的process_IN_CREATE其实已经执行过了,即使后面重载process_IN_CREATE方法,原来的process_IN_CREATE
方法还是会被调用过

至于程序怎么识别process_IN_xxx之类的方法可以看_ProcessEvent里的__call__方法
  1. meth = getattr(self, 'process_' + maskname, None)
  2.     if meth is not None:
  3.         return meth(event)

  4. meth = getattr(self, 'process_IN_' + maskname.split('_')[1], None)
getattr函数很简单,返回名为process_+ maskname的函数
后面多定义了个process_IN +maskname的函数,所以process和process_IN都是可以的函数名

这个pyinotify最重要的就是这几个函数
  1. self._inotify_wrapper = INotifyWrapper.create()
  2.         if self._inotify_wrapper is None:
  3.             raise InotifyBindingNotFoundError()

  4.         self._fd = self._inotify_wrapper.inotify_init() # file descriptor
  5.         
  6.         
  7.          wd = self._inotify_wrapper.inotify_add_watch(self._fd, path, mask)
我们自己写个类似pyinotify的函数来试试直接调用INotifyWrapper看看

找了下发现INotifyWrapper也是pyinotify里面定义的类,最终找到
  1. try:
  2.             libc_name = ctypes.util.find_library('c')
  3.         except (OSError, IOError):
  4.             pass # Will attemp to load it with None anyway.

  5.         if sys.version_info >= (2, 6):
  6.             self._libc = ctypes.CDLL(libc_name, use_errno=True)
  7.             self._get_errno_func = ctypes.get_errno
  8.         else:
  9.             self._libc = ctypes.CDLL(libc_name)
  10.             try:
  11.                 location = self._libc.__errno_location
  12.                 location.restype = ctypes.POINTER(ctypes.c_int)
  13.                 self._get_errno_func = lambda: location().contents.value
  14.             except AttributeError:
  15.                 pass

  16.         # Eventually check that libc has needed inotify bindings.
  17.         if (not hasattr(self._libc, 'inotify_init') or
  18.             not hasattr(self._libc, 'inotify_add_watch') or
  19.             not hasattr(self._libc, 'inotify_rm_watch')):
  20.             return False
  21.         return True
最终发现是通过ctypes.CDLL('libc.so.6')掉出inotify相关的c封装的
阅读(3719) | 评论(0) | 转发(1) |
0

上一篇:python下载漫画

下一篇:python实现syn攻击

给主人留下些什么吧!~~