Skip to main content

Using Files walkFileTree Method

There are several common uses of Files walkFileTree  method.
1.       Finding File

import java.io.IOException;
import java.nio.file.*;
import java.nio.file.attribute.*;

class FileFindVisitor extends SimpleFileVisitor<Path> {
    private PathMatcher matcher;
    public FileFindVisitor(String pattern){
        try {
matcher = FileSystems.getDefault().getPathMatcher(pattern);
        } catch(IllegalArgumentException e) {
            e.printStackTrace();
        }
    }
    public FileVisitResult visitFile(Path path, BasicFileAttributes
fileAttributes){
        find(path);
        return FileVisitResult.CONTINUE;
    }
   
    private void find(Path path) {
        Path name = path.getFileName();
        if(matcher.matches(name))
            System.out.println("Match found:" + path.getFileName());
    }
   
    public FileVisitResult preVisitDirectory(Path path,
BasicFileAttributes fileAttributes){
        find(path);
        return FileVisitResult.CONTINUE;
    }
   
    public static void main(String[] args) {
        if(args.length != 2){
            System.out.println("usage: java FileTreeWalkFind <path>
<search pattern>");
            System.exit(−1);
        }

        Path path = Paths.get(args[0]);
        String pattern = args[1];
        try {
            Files.walkFileTree(path, new FileFindVisitor(pattern));
        } catch (IOException e) {
            e.printStackTrace();
        }
    }
}






2.       Deleting Directories

Before deleting a directory all files contained in that directory must be deleted.

import java.io.IOException;
import java.nio.file.*;
import java.nio.file.attribute.*;

class DeleteDirVisitor extends SimpleFileVisitor<Path> {
    @Override
     public FileVisitResult visitFile(Path file, BasicFileAttributes
attrs)
         throws IOException
     {
         Files.delete(file);
         return FileVisitResult.CONTINUE;
     }
     @Override
     public FileVisitResult postVisitDirectory(Path dir, IOException
e)
         throws IOException
     {
         if (e == null) {
             Files.delete(dir);
             return FileVisitResult.CONTINUE;
         } else {
             // directory iteration failed
             throw e;
         }
     }
   
    public static void main(String[] args) {
        if(args.length != 1){
            System.out.println("usage: java DeleteDirVisitor <dir-to-
remove>");
            System.exit(−1);
        }
        Path path = Paths.get(args[0]);
        try {
            Files.walkFileTree(path, new DeleteDirVisitor());
        } catch (IOException e) {
            e.printStackTrace();
        }
    }
}

3.       Copying Directories
Copying a directory tree requires following symbolink links and seperate copying of all subdirectories and files.


import java.io.IOException;
import java.nio.file.*;
import java.nio.file.attribute.*;

class CopyDirVisitor extends SimpleFileVisitor<Path> {
    Path source = null;
    Path target = null;
   
    public CopyDirVisitor(Path source,Path target){
        this.source = source;
        this.target = target;
    }
   
    @Override
     public FileVisitResult preVisitDirectory(Path dir,
BasicFileAttributes attrs) throws IOException
     {
         Path targetdir = target.resolve(source.relativize(dir));
         try {
             Files.copy(dir, targetdir);
         } catch (FileAlreadyExistsException e) {
              if (!Files.isDirectory(targetdir))
                  throw e;
         }
         return CONTINUE;
     }
     @Override
     public FileVisitResult visitFile(Path file, BasicFileAttributes
attrs) throws IOException
     {
         Files.copy(file, target.resolve(source.relativize(file)));
         return CONTINUE;
     }
   
    public static void main(String[] args) {
        if(args.length != 2){
            System.out.println("usage: java CopyDirVisitor <source-
dir-to-copy-from> <target-dir-to-copy-to> ");
            System.exit(−1);
        }
        Path source = Paths.get(args[0]);
        Path destination = Paths.get(args[1]);
        try {
            Files.walkFileTree(source,EnumSet.of(FileVisitOption.FOLLOW_LINKS), Integer.MAX_VALUE, new CopyDirVisitor(source,destination));
        } catch (IOException e) {
            e.printStackTrace();
        }
    }
}


Comments

Popular posts from this blog

Obfuscating Spring Boot Projects Using Maven Proguard Plugin

Introduction Obfuscation is the act of reorganizing bytecode such that it becomes hard to decompile. Many developers rely on obfuscation to save their sensitive code from undesired eyes. Publishing jars without obfuscation may hinder competitiveness because rivals may take advantage of easily decompilable nature of java binaries. Objective Spring Boot applications make use of public interfaces, annotations which makes applications harder to obfuscate. Additionally, maven Spring Boot plugin creates a fat jar which contains all dependent jars. It is not viable to obfuscate the whole fat jar. Thus obfuscating Spring Boot applications is different than obfuscating regular java applications and requires a suitable strategy. Audience Those who use Spring Boot and Maven and wish to obfuscate their application using Proguard are the target audience for this article. Sample Application As the sample application, I will use elastic search synch application from my GitHub repository.

Hadoop Installation Document - Standalone Mode

This document shows my experience on following apache document titled “Hadoop:Setting up a Single Node Cluster”[1] which is for Hadoop version 3.0.0-Alpha2 [2]. A. Prepare the guest environment Install VirtualBox. Create a virtual 64 bit Linux machine. Name it “ubuntul_hadoop_master”. Give it 500MB memory. Create a VMDK disc which is dynamically allocated up to 30GB. In network settings in first tab you should see Adapter 1 enabled and attached to “NAT”. In second table enable adapter 2 and attach to “Host Only Adaptor”. First adapter is required for internet connection. Second one is required for letting outside connect to a guest service. In storage settings, attach a Linux iso file to IDE channel. Use any distribution you like. Because of small installation size, I choose minimal Ubuntu iso [1]. In package selection menu, I only left standard packages selected.  Login to system.  Setup JDK. $ sudo apt-get install openjdk-8-jdk Install ssh and pdsh, if not already i

Java: Cost of Volatile Variables

Introduction Use of volatile variables is common among Java developers as a way of implicit synchronization. JIT compilers may reorder program execution to increase performance. Java memory model[1] constraints reordering of volatile variables. Thus volatile variable access should has a cost which is different than a non-volatile variable access. This article will not discuss technical details on use of volatile variables. Performance impact of volatile variables is explored by using a test application. Objective Exploring volatile variable costs and comparing with alternative approaches. Audience This article is written for developers who seek to have a view about cost of volatile variables. Test Configuration Test application runs read and write actions on java variables. A non volatile primitive integer, a volatile primitive integer and an AtomicInteger is tested. Non-volatile primitive integer access is controlled with ReentrantLock and ReentrantReadWriteLock  to compa