1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
|
// Copyright 2022 Huawei Cloud Computing Technology Co., Ltd.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "src/other_tools/ops_maps/archive_fetch_map.hpp"
#include <string>
#include "fmt/core.h"
#include "src/buildtool/file_system/file_storage.hpp"
#include "src/buildtool/file_system/file_system_manager.hpp"
#include "src/buildtool/storage/storage.hpp"
#include "src/other_tools/just_mr/progress_reporting/progress.hpp"
#include "src/other_tools/just_mr/progress_reporting/statistics.hpp"
#include "src/other_tools/just_mr/utils.hpp"
namespace {
void ProcessContent(std::filesystem::path const& content_path,
std::filesystem::path const& target_name,
gsl::not_null<IExecutionApi const*> const& local_api,
IExecutionApi::OptionalPtr const& remote_api,
std::string const& content,
ArchiveFetchMap::SetterPtr const& setter,
ArchiveFetchMap::LoggerPtr const& logger) {
// try to back up to remote CAS
if (remote_api) {
if (not local_api->RetrieveToCas(
{Artifact::ObjectInfo{
.digest = ArtifactDigest{content, 0, /*is_tree=*/false},
.type = ObjectType::File}},
**remote_api)) {
// give a warning
(*logger)(fmt::format("Failed to back up content {} from local CAS "
"to remote",
content),
/*fatal=*/false);
}
}
// then, copy content into fetch_dir
if (FileSystemManager::Exists(target_name)) {
std::filesystem::permissions(target_name,
std::filesystem::perms::owner_write,
std::filesystem::perm_options::add);
}
if (not FileSystemManager::CopyFile(content_path, target_name)) {
(*logger)(fmt::format("Failed to copy content {} from CAS to {}",
content,
target_name.string()),
/*fatal=*/true);
return;
}
// success
JustMRStatistics::Instance().IncrementExecutedCounter();
(*setter)(true);
}
} // namespace
auto CreateArchiveFetchMap(gsl::not_null<ContentCASMap*> const& content_cas_map,
std::filesystem::path const& fetch_dir,
gsl::not_null<IExecutionApi const*> const& local_api,
IExecutionApi::OptionalPtr const& remote_api,
std::size_t jobs) -> ArchiveFetchMap {
auto fetch_archive = [content_cas_map, fetch_dir, local_api, remote_api](
auto ts,
auto setter,
auto logger,
auto /* unused */,
auto const& key) {
// get corresponding distfile
auto distfile =
(key.distfile
? key.distfile.value()
: std::filesystem::path(key.fetch_url).filename().string());
auto target_name = fetch_dir / distfile;
// make sure content is in CAS
content_cas_map->ConsumeAfterKeysReady(
ts,
{key},
[target_name,
local_api,
remote_api,
content = key.content,
setter,
logger]([[maybe_unused]] auto const& values) {
// content is in local CAS now
auto const& cas = Storage::Instance().CAS();
auto content_path =
cas.BlobPath(ArtifactDigest{content, 0, /*is_tree=*/false},
/*is_executable=*/false)
.value();
ProcessContent(content_path,
target_name,
local_api,
remote_api,
content,
setter,
logger);
},
[logger, content = key.content](auto const& msg, bool fatal) {
(*logger)(
fmt::format("While ensuring content {} is in CAS:\n{}",
content,
msg),
fatal);
});
};
return AsyncMapConsumer<ArchiveContent, bool>(fetch_archive, jobs);
}
|