Skip to content

spf13/afero

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

486 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

afero logo-sm

GitHub Workflow Status GoDoc Go Report Card Go Version

Afero: The Universal Filesystem Abstraction for Go

Afero is a filesystem abstraction library for Go that works as a drop-in replacement for the standard os package. Adopt it with minimal code changes, then swap any backendβ€”local disk, in-memory, cloud, or archiveβ€”without touching your application logic.

Two headline benefits: testing becomes trivial (replace the OS with a fast in-memory filesystem in one line, no disk cleanup required), and your code stays portable across any storage backend through a single afero.Fs interface.

Why Afero?

Afero elevates filesystem interaction beyond simple file reading and writing, offering solutions for testability, flexibility, and advanced architecture.

πŸ”‘ Key Features:

  • Universal API: Write your code once. Run it against the local OS, in-memory storage, ZIP/TAR archives, or remote systems (SFTP, GCS).
  • Ultimate Testability: Utilize MemMapFs, a fully concurrent-safe, read/write in-memory filesystem. Write fast, isolated, and reliable unit tests without touching the physical disk or worrying about cleanup.
  • Powerful Composition: Afero's hidden superpower. Layer filesystems on top of each other to create sophisticated behaviors:
    • Sandboxing: Use CopyOnWriteFs to create temporary scratch spaces that isolate changes from the base filesystem.
    • Caching: Use CacheOnReadFs to automatically layer a fast cache (like memory) over a slow backend (like a network drive).
    • Security Jails: Use BasePathFs to restrict application access to a specific subdirectory (chroot).
  • os Package Compatibility: Afero mirrors the functions in the standard os package, making adoption and refactoring seamless.
  • io/fs Compatibility: Fully compatible with the Go standard library's io/fs interfaces.

Installation

go get github.com/spf13/afero
import "github.com/spf13/afero"

Backend Reference

Type Backend Constructor Description Status
Core OsFs afero.NewOsFs() Interacts with the real operating system filesystem. Use in production. βœ… Official
MemMapFs afero.NewMemMapFs() A fast, atomic, concurrent-safe, in-memory filesystem. Ideal for testing. βœ… Official
Composition CopyOnWriteFs afero.NewCopyOnWriteFs(base, overlay) A read-only base with a writable overlay. Ideal for sandboxing. βœ… Official
CacheOnReadFs afero.NewCacheOnReadFs(base, cache, ttl) Lazily caches files from a slow base into a fast layer on first read. βœ… Official
BasePathFs afero.NewBasePathFs(source, path) Restricts operations to a subdirectory (chroot/jail). βœ… Official
ReadOnlyFs afero.NewReadOnlyFs(source) Provides a read-only view, preventing any modifications. βœ… Official
RegexpFs afero.NewRegexpFs(source, regexp) Filters a filesystem, only showing files that match a regex. βœ… Official
Utility HttpFs afero.NewHttpFs(source) Wraps any Afero filesystem to be served via http.FileServer. βœ… Official
Archives ZipFs zipfs.New(zipReader) Read-only access to files within a ZIP archive. βœ… Official
TarFs tarfs.New(tarReader) Read-only access to files within a TAR archive. βœ… Official
Network GcsFs gcsfs.NewGcsFs(...) Google Cloud Storage backend. ⚑ Experimental
SftpFs sftpfs.New(...) SFTP backend. ⚑ Experimental
3rd Party Cloud S3Fs fclairamb/afero-s3 Production-ready S3 backend built on official AWS SDK. πŸ”Ή 3rd Party
MinioFs cpyun/afero-minio MinIO object storage backend with S3 compatibility. πŸ”Ή 3rd Party
DriveFs fclairamb/afero-gdrive Google Drive backend with streaming support. πŸ”Ή 3rd Party
DropboxFs fclairamb/afero-dropbox Dropbox backend with streaming support. πŸ”Ή 3rd Party
3rd Party Specialized GitFs tobiash/go-gitfs Git repository filesystem (read-only, Afero compatible). πŸ”Ή 3rd Party
DockerFs unmango/aferox Docker container filesystem access. πŸ”Ή 3rd Party
GitHubFs unmango/aferox GitHub repository and releases filesystem. πŸ”Ή 3rd Party
FilterFs unmango/aferox Filesystem filtering with predicates. πŸ”Ή 3rd Party
IgnoreFs unmango/aferox .gitignore-aware filtering filesystem. πŸ”Ή 3rd Party
FUSEFs JakWai01/sile-fystem Generic FUSE implementation using any Afero backend. πŸ”Ή 3rd Party

Quick Start: The Power of Abstraction

The core of Afero is the afero.Fs interface. By designing your functions to accept this interface rather than calling os.* functions directly, your code instantly becomes more flexible and testable.

1. Refactor Your Code

Change functions that rely on the os package to accept afero.Fs.

// Before: Coupled to the OS and difficult to test
// func ProcessConfiguration(path string) error {
//     data, err := os.ReadFile(path)
//     ...
// }

import "github.com/spf13/afero"

// After: Decoupled, flexible, and testable
func ProcessConfiguration(fs afero.Fs, path string) error {
    // Use Afero utility functions which mirror os/ioutil
    data, err := afero.ReadFile(fs, path)
    // ... process the data
    return err
}

2. Usage in Production

In your production environment, inject the OsFs backend, which wraps the standard operating system calls.

func main() {
    // Use the real OS filesystem
    AppFs := afero.NewOsFs()
    ProcessConfiguration(AppFs, "/etc/myapp.conf")
}

3. Usage in Testing

Steps 1 and 2 represent the entire production footprint: accept afero.Fs instead of calling os directly, then inject OsFs at the call site. That's it. Swap OsFs for MemMapFs and the whole thing runs in memory, with no disk access and nothing to clean up:

func TestProcessConfiguration(t *testing.T) {
    // Use the in-memory filesystem
    AppFs := afero.NewMemMapFs()
    
    // Pre-populate the memory filesystem for the test
    configPath := "/test/config.json"
    afero.WriteFile(AppFs, configPath, []byte(`{"feature": true}`), 0644)

    // Run the test entirely in memory
    err := ProcessConfiguration(AppFs, configPath)
    if err != nil {
        t.Fatal(err)
    }
}

Afero's Superpower: Composition

Afero's most unique feature is its ability to combine filesystems. This allows you to build complex behaviors out of simple components, keeping your application logic clean.

Example 1: Sandboxing with Copy-on-Write

Problem: You want integration tests that exercise code against real configuration files without any risk of accidentally modifying them. Or you need to let untrusted code "modify" system files in a fully contained environment.

All writes are captured in the in-memory overlay; the base is never touched:

// 1. The base layer is the real OS, made read-only for safety.
baseFs := afero.NewReadOnlyFs(afero.NewOsFs())

// 2. The overlay layer is a temporary in-memory filesystem for changes.
overlayFs := afero.NewMemMapFs()

// 3. Combine them. Reads fall through to the base; writes only hit the overlay.
sandboxFs := afero.NewCopyOnWriteFs(baseFs, overlayFs)

// The application can now "modify" /etc/hosts, but the changes are isolated in memory.
afero.WriteFile(sandboxFs, "/etc/hosts", []byte("127.0.0.1 sandboxed-app"), 0644)

// The real /etc/hosts on disk is untouched.

Example 2: Caching a Slow Filesystem

Problem: Your application reads the same files repeatedly from a slow backend network storage, cloud, SFTP. You want instant repeated reads without rewriting a single line of file-access code.

Layer a fast in-memory cache in front; the first read fetches and caches, every subsequent read is instant:

import "time"

// Assume 'remoteFs' is a slow backend (e.g., SFTP or GCS)
var remoteFs afero.Fs 

// 'cacheFs' is a fast in-memory backend
cacheFs := afero.NewMemMapFs()

// Create the caching layer. Cache items for 5 minutes upon first read.
cachedFs := afero.NewCacheOnReadFs(remoteFs, cacheFs, 5*time.Minute)

// The first read is slow (fetches from remote, then caches)
data1, _ := afero.ReadFile(cachedFs, "data.json")

// The second read is instant (serves from memory cache)
data2, _ := afero.ReadFile(cachedFs, "data.json")

Example 3: Security Jails (chroot)

Problem: You need to expose filesystem access to a plugin, template engine, or user-submitted process but directory traversal must be impossible. It should only ever see a single rooted directory.

osFs := afero.NewOsFs()

// Create a filesystem rooted at /home/user/public
// The application cannot access anything above this directory.
jailedFs := afero.NewBasePathFs(osFs, "/home/user/public")

// To the application, this is reading "/"
// In reality, it's reading "/home/user/public/"
dirInfo, err := afero.ReadDir(jailedFs, "/")

// Attempts to access parent directories fail
_, err = jailedFs.Open("../secrets.txt") // Returns an error

Real-World Use Cases

Build Cloud-Agnostic Applications

Write applications that seamlessly work with different storage backends:

type DocumentProcessor struct {
    fs afero.Fs
}

func NewDocumentProcessor(fs afero.Fs) *DocumentProcessor {
    return &DocumentProcessor{fs: fs}
}

func (p *DocumentProcessor) Process(inputPath, outputPath string) error {
    // This code works whether fs is local disk, cloud storage, or memory
    content, err := afero.ReadFile(p.fs, inputPath)
    if err != nil {
        return err
    }
    
    processed := processContent(content)
    return afero.WriteFile(p.fs, outputPath, processed, 0644)
}

// Use with local filesystem
processor := NewDocumentProcessor(afero.NewOsFs())

// Use with Google Cloud Storage
processor := NewDocumentProcessor(gcsFS)

// Use with in-memory filesystem for testing
processor := NewDocumentProcessor(afero.NewMemMapFs())

Treating Archives as Filesystems

ZIP and TAR archives are directories in disguise. Afero exposes them as a standard afero.Fsβ€”which means any code that already accepts afero.Fs works unchanged against an archive, with no extraction, no temp directory, and no cleanup required.

This is particularly useful when:

  • Processing uploaded ZIP files in a web handler without writing decompressed content to disk
  • Reading fixture data bundled into a binary without //go:embed
  • Writing archive inspection or transformation tools that reuse the same traversal logic as your real filesystem code
  • Running tests against a canned, read-only snapshot of a directory tree shipped as a .zip
import (
    "archive/zip"
    "github.com/spf13/afero/zipfs"
)

// Open any .zip β€” from disk, an HTTP response body, or memory
zipFile, _ := zip.OpenReader("bundle.zip")
defer zipFile.Close()

// Treat the archive as a filesystem β€” no extraction needed
archiveFS := zipfs.New(&zipFile.Reader)

// The same code that works with OsFs or MemMapFs works here unchanged
content, err := afero.ReadFile(archiveFS, "docs/readme.md")
entries, err := afero.ReadDir(archiveFS, "configs/")

Serving Any Filesystem over HTTP

Use HttpFs to expose any Afero filesystemβ€”even one created dynamically in memoryβ€”through a standard Go web server.

import (
    "net/http"
    "github.com/spf13/afero"
)

func main() {
    memFS := afero.NewMemMapFs()
    afero.WriteFile(memFS, "index.html", []byte("<h1>Hello from Memory!</h1>"), 0644)

    // Wrap the memory filesystem to make it compatible with http.FileServer.
    httpFS := afero.NewHttpFs(memFS)

    http.Handle("/", http.FileServer(httpFS.Dir("/")))
    http.ListenAndServe(":8080", nil)
}

Testing Made Simple

One of Afero's greatest strengths is making filesystem-dependent code easily testable:

func SaveUserData(fs afero.Fs, userID string, data []byte) error {
    filename := fmt.Sprintf("users/%s.json", userID)
    return afero.WriteFile(fs, filename, data, 0644)
}

func TestSaveUserData(t *testing.T) {
    // Create a clean, fast, in-memory filesystem for testing
    testFS := afero.NewMemMapFs()
    
    userData := []byte(`{"name": "John", "email": "john@example.com"}`)
    err := SaveUserData(testFS, "123", userData)
    
    if err != nil {
        t.Fatalf("SaveUserData failed: %v", err)
    }
    
    // Verify the file was saved correctly
    saved, err := afero.ReadFile(testFS, "users/123.json")
    if err != nil {
        t.Fatalf("Failed to read saved file: %v", err)
    }
    
    if string(saved) != string(userData) {
        t.Errorf("Data mismatch: got %s, want %s", saved, userData)
    }
}

Benefits of testing with Afero:

  • ⚑ Fast - No disk I/O, tests run in memory
  • πŸ”„ Reliable - Each test starts with a clean slate
  • 🧹 No cleanup - Memory is automatically freed
  • πŸ”’ Safe - Can't accidentally modify real files
  • πŸƒ Parallel - Tests can run concurrently without conflicts

Afero vs. io/fs (Go 1.16+)

Go 1.16 introduced the io/fs package, which provides a standard abstraction for read-only filesystems.

Afero complements io/fs by focusing on different needs:

  • Use io/fs when: You only need to read files and want to conform strictly to the standard library interfaces.
  • Use Afero when:
    • Your application needs to create, write, modify, or delete files.
    • You need to test complex read/write interactions (e.g., renaming, concurrent writes).
    • You need advanced compositional features (Copy-on-Write, Caching, etc.).

Afero is fully compatible with io/fs. You can wrap any Afero filesystem to satisfy the fs.FS interface using afero.NewIOFS:

import "io/fs"

// Create an Afero filesystem (writable)
var myAferoFs afero.Fs = afero.NewMemMapFs()

// Convert it to a standard library fs.FS (read-only view)
var myIoFs fs.FS = afero.NewIOFS(myAferoFs)

Third-Party Backends & Ecosystem

The Afero community has developed numerous backends and tools that extend the library's capabilities. Below are curated, well-maintained options organized by maturity and reliability.

Featured Community Backends

These are mature, reliable backends that we can confidently recommend for production use:

Amazon S3 - fclairamb/afero-s3

Production-ready S3 backend built on the official AWS SDK for Go.

import "github.com/fclairamb/afero-s3"

s3fs := s3.NewFs(bucket, session)

MinIO object storage backend providing S3-compatible object storage with deduplication and optimization features.

import "github.com/cpyun/afero-minio"

minioFs := miniofs.NewMinioFs(ctx, "minio://endpoint/bucket")

Community & Specialized Backends

Cloud Storage

Version Control Systems

  • Git Repositories - tobiash/go-gitfs
    Read-only filesystem abstraction for Git repositories. Works with bare repositories and provides filesystem view of any git reference. Uses go-git for repository access.

Container and Remote Systems

  • Docker Containers - unmango/aferox
    Access Docker container filesystems as if they were local filesystems

  • GitHub API - unmango/aferox
    Turn GitHub repositories, releases, and assets into browsable filesystems

FUSE Integration

  • Generic FUSE - JakWai01/sile-fystem
    Mount any Afero filesystem as a FUSE filesystem, allowing any Afero backend to be used as a real mounted filesystem

Specialized Filesystems

  • FAT32 Support - aligator/GoFAT
    Pure Go FAT filesystem implementation (currently read-only)

Interface Adapters & Utilities

Cross-Interface Compatibility:

Working Directory Management:

Advanced Filtering:

  • unmango/aferox includes multiple specialized filesystems:
    • FilterFs - Predicate-based file filtering
    • IgnoreFs - .gitignore-aware filtering
    • WriterFs - Dump writes to io.Writer for debugging

Developer Tools & Utilities

nhatthm Utility Suite - Essential tools for Afero development:

Ecosystem Showcase

Windows Virtual Drives - balazsgrill/potatodrive
Mount any Afero filesystem as a Windows drive letter. Brilliant demonstration of Afero's power!

Modern Asset Embedding (Go 1.16+)

Instead of third-party tools, use Go's native //go:embed with Afero:

import (
    "embed"
    "github.com/spf13/afero"
)

//go:embed assets/*
var assetsFS embed.FS

func main() {
    // Convert embedded files to Afero filesystem
    fs := afero.FromIOFS(assetsFS)
    
    // Use like any other Afero filesystem
    content, _ := afero.ReadFile(fs, "assets/config.json")
}

Contributing

We welcome contributions! The project is mature, but we are actively looking for contributors to help implement and stabilize network/cloud backends.

  • πŸ”₯ Microsoft Azure Blob Storage
  • πŸ”’ Modern Encryption Backend - Built on secure, contemporary crypto (not legacy EncFS)
  • πŸ™ Canonical go-git Adapter - Unified solution for Git integration
  • πŸ“‘ SSH/SCP Backend - Secure remote file operations
  • Stabilization of existing experimental backends (GCS, SFTP)

To contribute:

  1. Fork the repository
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Add some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create a new Pull Request

πŸ“„ License

Afero is released under the Apache 2.0 license. See LICENSE.txt for details.

πŸ”— Additional Resources


Afero comes from the Latin roots Ad-Facere, meaning "to make" or "to do" - fitting for a library that empowers you to make and do amazing things with filesystems.

Packages

 
 
 

Contributors

Languages