Cache worker
This commit is contained in:
736
wasmtime-environ/src/cache/worker.rs
vendored
Normal file
736
wasmtime-environ/src/cache/worker.rs
vendored
Normal file
@@ -0,0 +1,736 @@
|
||||
//! Background worker that watches over the cache.
|
||||
//!
|
||||
//! It cleans up old cache, updates statistics and optimizes the cache.
|
||||
//! We allow losing some messages (it doesn't hurt) and some races,
|
||||
//! but we guarantee eventual consistency and fault tolerancy.
|
||||
//! Background tasks can be CPU intensive, but the worker thread has low priority.
|
||||
|
||||
use super::{cache_config, fs_write_atomic};
|
||||
use log::{debug, info, trace, warn};
|
||||
use serde::{Deserialize, Serialize};
|
||||
use spin::Once;
|
||||
use std::cmp;
|
||||
use std::collections::HashMap;
|
||||
use std::ffi::OsStr;
|
||||
use std::fs;
|
||||
use std::path::{Path, PathBuf};
|
||||
use std::sync::atomic::{self, AtomicBool};
|
||||
use std::sync::mpsc::{sync_channel, Receiver, SyncSender};
|
||||
use std::thread;
|
||||
use std::time::Duration;
|
||||
use std::time::SystemTime;
|
||||
use std::vec::Vec;
|
||||
|
||||
enum CacheEvent {
|
||||
OnCacheGet(PathBuf),
|
||||
OnCacheUpdate(PathBuf),
|
||||
}
|
||||
|
||||
static SENDER: Once<SyncSender<CacheEvent>> = Once::new();
|
||||
static INIT_CALLED: AtomicBool = AtomicBool::new(false);
|
||||
|
||||
pub(super) fn init(init_file_per_thread_logger: Option<&'static str>) {
|
||||
INIT_CALLED
|
||||
.compare_exchange(
|
||||
false,
|
||||
true,
|
||||
atomic::Ordering::SeqCst,
|
||||
atomic::Ordering::SeqCst,
|
||||
)
|
||||
.expect("Cache worker init must be called at most once");
|
||||
|
||||
let (tx, rx) = sync_channel(cache_config::worker_event_queue_size());
|
||||
let _ = SENDER.call_once(move || tx);
|
||||
thread::spawn(move || worker_thread(rx, init_file_per_thread_logger));
|
||||
}
|
||||
|
||||
pub(super) fn on_cache_get_async(path: impl AsRef<Path>) {
|
||||
let event = CacheEvent::OnCacheGet(path.as_ref().to_path_buf());
|
||||
send_cache_event(event);
|
||||
}
|
||||
|
||||
pub(super) fn on_cache_update_async(path: impl AsRef<Path>) {
|
||||
let event = CacheEvent::OnCacheUpdate(path.as_ref().to_path_buf());
|
||||
send_cache_event(event);
|
||||
}
|
||||
|
||||
#[inline]
|
||||
fn send_cache_event(event: CacheEvent) {
|
||||
match SENDER
|
||||
.r#try()
|
||||
.expect("Cache worker init must be called before using the worker")
|
||||
.try_send(event)
|
||||
{
|
||||
Ok(()) => (),
|
||||
Err(err) => info!(
|
||||
"Failed to send asynchronously message to worker thread: {}",
|
||||
err
|
||||
),
|
||||
}
|
||||
}
|
||||
|
||||
fn worker_thread(
|
||||
receiver: Receiver<CacheEvent>,
|
||||
init_file_per_thread_logger: Option<&'static str>,
|
||||
) {
|
||||
assert!(INIT_CALLED.load(atomic::Ordering::SeqCst));
|
||||
|
||||
if let Some(prefix) = init_file_per_thread_logger {
|
||||
file_per_thread_logger::initialize(prefix);
|
||||
}
|
||||
|
||||
debug!("Cache worker thread started.");
|
||||
|
||||
lower_thread_priority();
|
||||
|
||||
for event in receiver.iter() {
|
||||
match event {
|
||||
CacheEvent::OnCacheGet(path) => handle_on_cache_get(path),
|
||||
CacheEvent::OnCacheUpdate(path) => handle_on_cache_update(path),
|
||||
}
|
||||
}
|
||||
|
||||
// The receiver can stop iteration iff the channel has hung up. The channel will never
|
||||
// hang up, because we have static SyncSender, and Rust doesn't drop static variables.
|
||||
unreachable!()
|
||||
}
|
||||
|
||||
#[cfg(target_os = "windows")]
|
||||
fn lower_thread_priority() {
|
||||
use core::convert::TryInto;
|
||||
use winapi::um::processthreadsapi::{GetCurrentThread, SetThreadPriority};
|
||||
use winapi::um::winbase::THREAD_MODE_BACKGROUND_BEGIN;
|
||||
|
||||
// https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-setthreadpriority
|
||||
// https://docs.microsoft.com/en-us/windows/win32/procthread/scheduling-priorities
|
||||
|
||||
if unsafe {
|
||||
SetThreadPriority(
|
||||
GetCurrentThread(),
|
||||
THREAD_MODE_BACKGROUND_BEGIN.try_into().unwrap(),
|
||||
)
|
||||
} == 0
|
||||
{
|
||||
warn!("Failed to lower worker thread priority. It might affect application performance.");
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(not(target_os = "windows"))]
|
||||
fn lower_thread_priority() {
|
||||
// http://man7.org/linux/man-pages/man7/sched.7.html
|
||||
|
||||
const NICE_DELTA_FOR_BACKGROUND_TASKS: i32 = 3;
|
||||
|
||||
errno::set_errno(errno::Errno(0));
|
||||
let current_nice = unsafe { libc::nice(NICE_DELTA_FOR_BACKGROUND_TASKS) };
|
||||
let errno_val = errno::errno().0;
|
||||
|
||||
if errno_val != 0 {
|
||||
warn!("Failed to lower worker thread priority. It might affect application performance. errno: {}", errno_val);
|
||||
} else {
|
||||
debug!("New nice value of worker thread: {}", current_nice);
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Serialize, Deserialize)]
|
||||
struct ModuleCacheStatistics {
|
||||
pub usages: u64,
|
||||
#[serde(rename = "optimized-compression")]
|
||||
pub compression_level: i32,
|
||||
}
|
||||
|
||||
impl Default for ModuleCacheStatistics {
|
||||
fn default() -> Self {
|
||||
Self {
|
||||
usages: 0,
|
||||
compression_level: cache_config::baseline_compression_level(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/// Increases the usage counter and recompresses the file
|
||||
/// if the usage counter reached configurable treshold.
|
||||
fn handle_on_cache_get(path: PathBuf) {
|
||||
trace!("handle_on_cache_get() for path: {}", path.display());
|
||||
|
||||
// construct .stats file path
|
||||
let filename = path.file_name().unwrap().to_str().unwrap();
|
||||
let stats_path = path.with_file_name(format!("{}.stats", filename));
|
||||
|
||||
// load .stats file (default if none or error)
|
||||
let mut stats =
|
||||
read_stats_file(stats_path.as_ref()).unwrap_or_else(|| ModuleCacheStatistics::default());
|
||||
|
||||
// step 1: update the usage counter & write to the disk
|
||||
// it's racy, but it's fine (the counter will be just smaller,
|
||||
// sometimes will retrigger recompression)
|
||||
stats.usages += 1;
|
||||
if !write_stats_file(stats_path.as_ref(), &stats) {
|
||||
return;
|
||||
}
|
||||
|
||||
// step 2: recompress if there's a need
|
||||
let opt_compr_lvl = cache_config::optimized_compression_level();
|
||||
if stats.compression_level >= opt_compr_lvl
|
||||
|| stats.usages < cache_config::optimized_compression_usage_counter_threshold()
|
||||
{
|
||||
return;
|
||||
}
|
||||
|
||||
let lock_path = if let Some(p) = acquire_task_fs_lock(
|
||||
path.as_ref(),
|
||||
cache_config::optimizing_compression_task_timeout(),
|
||||
) {
|
||||
p
|
||||
} else {
|
||||
return;
|
||||
};
|
||||
|
||||
trace!("Trying to recompress file: {}", path.display());
|
||||
|
||||
// recompress, write to other file, rename (it's atomic file content exchange)
|
||||
// and update the stats file
|
||||
fs::read(&path)
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to read old cache file, path: {}, err: {}",
|
||||
path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.ok()
|
||||
.and_then(|compressed_cache_bytes| {
|
||||
zstd::decode_all(&compressed_cache_bytes[..])
|
||||
.map_err(|err| warn!("Failed to decompress cached code: {}", err))
|
||||
.ok()
|
||||
})
|
||||
.and_then(|cache_bytes| {
|
||||
zstd::encode_all(
|
||||
&cache_bytes[..],
|
||||
opt_compr_lvl,
|
||||
)
|
||||
.map_err(|err| warn!("Failed to compress cached code: {}", err))
|
||||
.ok()
|
||||
})
|
||||
.and_then(|recompressed_cache_bytes| {
|
||||
fs::write(&lock_path, &recompressed_cache_bytes)
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to write recompressed cache, path: {}, err: {}",
|
||||
lock_path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.ok()
|
||||
})
|
||||
.and_then(|()| {
|
||||
fs::rename(&lock_path, &path)
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to rename recompressed cache, path from: {}, path to: {}, err: {}",
|
||||
lock_path.display(),
|
||||
path.display(),
|
||||
err
|
||||
);
|
||||
if let Err(err) = fs::remove_file(&lock_path) {
|
||||
warn!(
|
||||
"Failed to clean up (remove) recompressed cache, path {}, err: {}",
|
||||
lock_path.display(),
|
||||
err
|
||||
);
|
||||
}
|
||||
})
|
||||
.ok()
|
||||
})
|
||||
.map(|()| {
|
||||
// update stats file (reload it! recompression can take some time)
|
||||
if let Some(mut new_stats) = read_stats_file(stats_path.as_ref()) {
|
||||
if new_stats.compression_level >= opt_compr_lvl {
|
||||
// Rare race:
|
||||
// two instances with different opt_compr_lvl: we don't know in which order they updated
|
||||
// the cache file and the stats file (they are not updated together atomically)
|
||||
// Possible solution is to use directories per cache entry, but it complicates the system
|
||||
// and is not worth it.
|
||||
debug!("DETECTED task did more than once (or race with new file): recompression of {}. \
|
||||
Note: if optimized compression level setting has changed in the meantine, \
|
||||
the stats file might contain inconsistent compression level due to race.", path.display());
|
||||
}
|
||||
else {
|
||||
new_stats.compression_level = opt_compr_lvl;
|
||||
let _ = write_stats_file(stats_path.as_ref(), &new_stats);
|
||||
}
|
||||
|
||||
if new_stats.usages < stats.usages {
|
||||
debug!("DETECTED lower usage count (new file or race with counter increasing): file {}", path.display());
|
||||
}
|
||||
}
|
||||
else {
|
||||
debug!("Can't read stats file again to update compression level (it might got cleaned up): file {}", stats_path.display());
|
||||
}
|
||||
});
|
||||
|
||||
trace!("Task finished: recompress file: {}", path.display());
|
||||
}
|
||||
|
||||
enum CacheEntry {
|
||||
Recognized {
|
||||
path: PathBuf,
|
||||
mtime: SystemTime,
|
||||
size: u64,
|
||||
},
|
||||
Unrecognized {
|
||||
path: PathBuf,
|
||||
is_dir: bool,
|
||||
},
|
||||
}
|
||||
|
||||
fn handle_on_cache_update(path: PathBuf) {
|
||||
trace!("handle_on_cache_update() for path: {}", path.display());
|
||||
|
||||
// ---------------------- step 1: create .stats file
|
||||
|
||||
// construct .stats file path
|
||||
let filename = path
|
||||
.file_name()
|
||||
.expect("Expected valid cache file name")
|
||||
.to_str()
|
||||
.expect("Expected valid cache file name");
|
||||
let stats_path = path.with_file_name(format!("{}.stats", filename));
|
||||
|
||||
// create and write stats file
|
||||
let mut stats = ModuleCacheStatistics::default();
|
||||
stats.usages += 1;
|
||||
write_stats_file(&stats_path, &stats);
|
||||
|
||||
// ---------------------- step 2: perform cleanup task if needed
|
||||
|
||||
// acquire lock for cleanup task
|
||||
// Lock is a proof of recent cleanup task, so we don't want to delete them.
|
||||
// Expired locks will be deleted by the cleanup task.
|
||||
let cleanup_file = cache_config::directory().join(".cleanup"); // some non existing marker file
|
||||
if acquire_task_fs_lock(&cleanup_file, cache_config::cleanup_interval()).is_none() {
|
||||
return;
|
||||
}
|
||||
|
||||
trace!("Trying to clean up cache");
|
||||
|
||||
let mut cache_index = list_cache_contents();
|
||||
cache_index.sort_unstable_by(|lhs, rhs| {
|
||||
// sort by age
|
||||
use CacheEntry::*;
|
||||
match (lhs, rhs) {
|
||||
(Recognized { mtime: lhs_mt, .. }, Recognized { mtime: rhs_mt, .. }) => {
|
||||
rhs_mt.cmp(lhs_mt)
|
||||
} // later == younger
|
||||
// unrecognized is kind of infinity
|
||||
(Recognized { .. }, Unrecognized { .. }) => cmp::Ordering::Less,
|
||||
(Unrecognized { .. }, Recognized { .. }) => cmp::Ordering::Greater,
|
||||
(Unrecognized { .. }, Unrecognized { .. }) => cmp::Ordering::Equal,
|
||||
}
|
||||
});
|
||||
|
||||
// find "cut" boundary:
|
||||
// - remove unrecognized files anyway,
|
||||
// - remove some cache files if some quota has been exceeded
|
||||
let mut total_size = 0u64;
|
||||
let mut start_delete_idx = None;
|
||||
let mut start_delete_idx_if_deleting_recognized_items: Option<usize> = None;
|
||||
|
||||
let total_size_limit = cache_config::files_total_size_soft_limit();
|
||||
let files_count_limit = cache_config::files_count_soft_limit();
|
||||
let tsl_if_deleting = total_size_limit
|
||||
.checked_mul(cache_config::files_total_size_limit_percent_if_deleting() as u64)
|
||||
.unwrap()
|
||||
/ 100;
|
||||
let fcl_if_deleting = files_count_limit
|
||||
.checked_mul(cache_config::files_count_limit_percent_if_deleting() as u64)
|
||||
.unwrap()
|
||||
/ 100;
|
||||
|
||||
for (idx, item) in cache_index.iter().enumerate() {
|
||||
let size = if let CacheEntry::Recognized { size, .. } = item {
|
||||
size
|
||||
} else {
|
||||
start_delete_idx = Some(idx);
|
||||
break;
|
||||
};
|
||||
|
||||
total_size += size;
|
||||
if start_delete_idx_if_deleting_recognized_items.is_none() {
|
||||
if total_size >= tsl_if_deleting || (idx + 1) as u64 >= fcl_if_deleting {
|
||||
start_delete_idx_if_deleting_recognized_items = Some(idx);
|
||||
}
|
||||
}
|
||||
|
||||
if total_size >= total_size_limit || (idx + 1) as u64 >= files_count_limit {
|
||||
start_delete_idx = start_delete_idx_if_deleting_recognized_items;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if let Some(idx) = start_delete_idx {
|
||||
for item in &cache_index[idx..] {
|
||||
let (result, path, entity) = match item {
|
||||
CacheEntry::Recognized { path, .. }
|
||||
| CacheEntry::Unrecognized {
|
||||
path,
|
||||
is_dir: false,
|
||||
} => (fs::remove_file(path), path, "file"),
|
||||
CacheEntry::Unrecognized { path, is_dir: true } => {
|
||||
(fs::remove_dir_all(path), path, "directory")
|
||||
}
|
||||
};
|
||||
if let Err(err) = result {
|
||||
warn!(
|
||||
"Failed to remove {} during cleanup, path: {}, err: {}",
|
||||
entity,
|
||||
path.display(),
|
||||
err
|
||||
);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
trace!("Task finished: clean up cache");
|
||||
}
|
||||
|
||||
fn read_stats_file(path: &Path) -> Option<ModuleCacheStatistics> {
|
||||
fs::read(path)
|
||||
.map_err(|err| {
|
||||
trace!(
|
||||
"Failed to read stats file, path: {}, err: {}",
|
||||
path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.and_then(|bytes| {
|
||||
toml::from_slice::<ModuleCacheStatistics>(&bytes[..]).map_err(|err| {
|
||||
trace!(
|
||||
"Failed to parse stats file, path: {}, err: {}",
|
||||
path.display(),
|
||||
err,
|
||||
)
|
||||
})
|
||||
})
|
||||
.ok()
|
||||
}
|
||||
|
||||
fn write_stats_file(path: &Path, stats: &ModuleCacheStatistics) -> bool {
|
||||
toml::to_string_pretty(&stats)
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to serialize stats file, path: {}, err: {}",
|
||||
path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.and_then(|serialized| {
|
||||
if fs_write_atomic(path, "stats", serialized.as_bytes()) {
|
||||
Ok(())
|
||||
} else {
|
||||
Err(())
|
||||
}
|
||||
})
|
||||
.is_ok()
|
||||
}
|
||||
|
||||
// Be fault tolerant: list as much as you can, and ignore the rest
|
||||
fn list_cache_contents() -> Vec<CacheEntry> {
|
||||
fn enter_dir(vec: &mut Vec<CacheEntry>, dir_path: &Path, level: u8) {
|
||||
macro_rules! unwrap_or {
|
||||
($result:expr, $cont:stmt, $err_msg:expr) => {
|
||||
unwrap_or!($result, $cont, $err_msg, dir_path)
|
||||
};
|
||||
($result:expr, $cont:stmt, $err_msg:expr, $path:expr) => {
|
||||
match $result {
|
||||
Ok(val) => val,
|
||||
Err(err) => {
|
||||
warn!(
|
||||
"{}, level: {}, path: {}, msg: {}",
|
||||
$err_msg,
|
||||
level,
|
||||
$path.display(),
|
||||
err
|
||||
);
|
||||
$cont
|
||||
}
|
||||
}
|
||||
};
|
||||
}
|
||||
macro_rules! add_unrecognized {
|
||||
(file: $path:expr) => {
|
||||
add_unrecognized!(false, $path)
|
||||
};
|
||||
(dir: $path:expr) => {
|
||||
add_unrecognized!(true, $path)
|
||||
};
|
||||
($is_dir:expr, $path:expr) => {
|
||||
vec.push(CacheEntry::Unrecognized {
|
||||
path: $path.to_path_buf(),
|
||||
is_dir: $is_dir,
|
||||
});
|
||||
};
|
||||
}
|
||||
macro_rules! add_unrecognized_and {
|
||||
([ $( $ty:ident: $path:expr ),* ], $cont:stmt) => {{
|
||||
$( add_unrecognized!($ty: $path); )*
|
||||
$cont
|
||||
}};
|
||||
}
|
||||
|
||||
// If we fail to list a directory, something bad is happening anyway
|
||||
// (something touches our cache or we have disk failure)
|
||||
// Try to delete it, so we can stay within soft limits of the cache size.
|
||||
// This comment applies later in this function, too.
|
||||
let it = unwrap_or!(
|
||||
fs::read_dir(dir_path),
|
||||
add_unrecognized_and!([dir: dir_path], return),
|
||||
"Failed to list cache directory, deleting it"
|
||||
);
|
||||
|
||||
let mut cache_files = HashMap::new();
|
||||
for entry in it {
|
||||
// read_dir() returns an iterator over results - in case some of them are errors
|
||||
// we don't know their names, so we can't delete them. We don't want to delete
|
||||
// the whole directory with good entries too, so we just ignore the erroneous entries.
|
||||
let entry = unwrap_or!(
|
||||
entry,
|
||||
continue,
|
||||
"Failed to read a cache dir entry (NOT deleting it, it still occupies space)"
|
||||
);
|
||||
let path = entry.path();
|
||||
match (level, path.is_dir()) {
|
||||
(0..=1, true) => enter_dir(vec, &path, level + 1),
|
||||
(0..=1, false) => {
|
||||
if level == 0 && path.file_stem() == Some(OsStr::new(".cleanup")) {
|
||||
if let Some(_) = path.extension() {
|
||||
// assume it's cleanup lock
|
||||
if !is_fs_lock_expired(
|
||||
Some(&entry),
|
||||
&path,
|
||||
cache_config::cleanup_interval(),
|
||||
) {
|
||||
continue; // skip active lock
|
||||
}
|
||||
}
|
||||
}
|
||||
add_unrecognized!(file: path);
|
||||
}
|
||||
(2, false) => {
|
||||
// assumption: only mod cache (no ext), .stats & .wip-* files
|
||||
let ext = path.extension();
|
||||
if ext.is_none() || ext == Some(OsStr::new("stats")) {
|
||||
cache_files.insert(path, entry);
|
||||
} else {
|
||||
// assume it's .wip file (lock)
|
||||
if is_fs_lock_expired(
|
||||
Some(&entry),
|
||||
&path,
|
||||
cache_config::optimizing_compression_task_timeout(),
|
||||
) {
|
||||
add_unrecognized!(file: path);
|
||||
} // else: skip active lock
|
||||
}
|
||||
}
|
||||
(_, is_dir) => add_unrecognized!(is_dir, path),
|
||||
}
|
||||
}
|
||||
|
||||
// associate module with its stats & handle them
|
||||
// assumption: just mods and stats
|
||||
for (path, entry) in cache_files.iter() {
|
||||
let path_buf: PathBuf;
|
||||
let (mod_, stats_, is_mod) = match path.extension() {
|
||||
Some(_) => {
|
||||
path_buf = path.with_extension("");
|
||||
(
|
||||
cache_files.get(&path_buf).map(|v| (&path_buf, v)),
|
||||
Some((path, entry)),
|
||||
false,
|
||||
)
|
||||
}
|
||||
None => {
|
||||
path_buf = path.with_extension("stats");
|
||||
(
|
||||
Some((path, entry)),
|
||||
cache_files.get(&path_buf).map(|v| (&path_buf, v)),
|
||||
true,
|
||||
)
|
||||
}
|
||||
};
|
||||
|
||||
// construct a cache entry
|
||||
match (mod_, stats_, is_mod) {
|
||||
(Some((mod_path, mod_entry)), Some((stats_path, stats_entry)), true) => {
|
||||
let mod_metadata = unwrap_or!(
|
||||
mod_entry.metadata(),
|
||||
add_unrecognized_and!([file: stats_path, file: mod_path], continue),
|
||||
"Failed to get metadata, deleting BOTH module cache and stats files",
|
||||
mod_path
|
||||
);
|
||||
let stats_mtime = unwrap_or!(
|
||||
stats_entry.metadata().and_then(|m| m.modified()),
|
||||
add_unrecognized_and!(
|
||||
[file: stats_path],
|
||||
unwrap_or!(
|
||||
mod_metadata.modified(),
|
||||
add_unrecognized_and!([file: stats_path, file: mod_path], continue),
|
||||
"Failed to get mtime, deleting BOTH module cache and stats files",
|
||||
mod_path
|
||||
)
|
||||
),
|
||||
"Failed to get metadata/mtime, deleting the file",
|
||||
stats_path
|
||||
);
|
||||
vec.push(CacheEntry::Recognized {
|
||||
path: mod_path.to_path_buf(),
|
||||
mtime: stats_mtime,
|
||||
size: mod_metadata.len(),
|
||||
})
|
||||
}
|
||||
(Some(_), Some(_), false) => (), // was or will be handled by previous branch
|
||||
(Some((mod_path, mod_entry)), None, _) => {
|
||||
let (mod_metadata, mod_mtime) = unwrap_or!(
|
||||
mod_entry
|
||||
.metadata()
|
||||
.and_then(|md| md.modified().map(|mt| (md, mt))),
|
||||
add_unrecognized_and!([file: mod_path], continue),
|
||||
"Failed to get metadata/mtime, deleting the file",
|
||||
mod_path
|
||||
);
|
||||
vec.push(CacheEntry::Recognized {
|
||||
path: mod_path.to_path_buf(),
|
||||
mtime: mod_mtime,
|
||||
size: mod_metadata.len(),
|
||||
})
|
||||
}
|
||||
(None, Some((stats_path, _stats_entry)), _) => {
|
||||
debug!("Found orphaned stats file: {}", stats_path.display());
|
||||
add_unrecognized!(file: stats_path);
|
||||
}
|
||||
_ => unreachable!(),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
let mut vec = Vec::new();
|
||||
enter_dir(&mut vec, cache_config::directory(), 0);
|
||||
vec
|
||||
}
|
||||
|
||||
/// Tries to acquire a lock for specific task.
|
||||
///
|
||||
/// Returns Some(path) to the lock if succeeds. The task path must not
|
||||
/// contain any extension and have file stem.
|
||||
///
|
||||
/// To release a lock you need either manually rename or remove it,
|
||||
/// or wait until it expires and cleanup task removes it.
|
||||
///
|
||||
/// Note: this function is racy. Main idea is: be fault tolerant and
|
||||
/// never block some task. The price is that we rarely do some task
|
||||
/// more than once.
|
||||
fn acquire_task_fs_lock(task_path: &Path, timeout: Duration) -> Option<PathBuf> {
|
||||
assert!(task_path.extension().is_none());
|
||||
assert!(task_path.file_stem().is_some());
|
||||
|
||||
// list directory
|
||||
let dir_path = task_path.parent()?;
|
||||
let it = fs::read_dir(dir_path)
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to list cache directory, path: {}, err: {}",
|
||||
dir_path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.ok()?;
|
||||
|
||||
// look for existing locks
|
||||
for entry in it {
|
||||
let entry = entry
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to list cache directory, path: {}, err: {}",
|
||||
dir_path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.ok()?;
|
||||
|
||||
let path = entry.path();
|
||||
if path.is_dir() || path.file_stem() != task_path.file_stem() {
|
||||
continue;
|
||||
}
|
||||
|
||||
// check extension and mtime
|
||||
match path.extension() {
|
||||
None => continue,
|
||||
Some(ext) => {
|
||||
if let Some(ext_str) = ext.to_str() {
|
||||
// if it's None, i.e. not valid UTF-8 string, then that's not our lock for sure
|
||||
if ext_str.starts_with("wip-")
|
||||
&& !is_fs_lock_expired(Some(&entry), &path, timeout)
|
||||
{
|
||||
return None;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// create the lock
|
||||
let lock_path = task_path.with_extension(format!("wip-{}", std::process::id()));
|
||||
let _file = fs::OpenOptions::new()
|
||||
.create_new(true)
|
||||
.write(true)
|
||||
.open(&lock_path)
|
||||
.map_err(|err| {
|
||||
warn!(
|
||||
"Failed to create lock file (note: it shouldn't exists): path: {}, err: {}",
|
||||
lock_path.display(),
|
||||
err
|
||||
)
|
||||
})
|
||||
.ok()?;
|
||||
|
||||
Some(lock_path)
|
||||
}
|
||||
|
||||
// we have either both, or just path; dir entry is desirable since on some platforms we can get
|
||||
// metadata without extra syscalls
|
||||
// futhermore: it's better to get a path if we have it instead of allocating a new one from the dir entry
|
||||
fn is_fs_lock_expired(entry: Option<&fs::DirEntry>, path: &PathBuf, threshold: Duration) -> bool {
|
||||
let mtime = match entry
|
||||
.map(|e| e.metadata())
|
||||
.unwrap_or_else(|| path.metadata())
|
||||
.and_then(|metadata| metadata.modified())
|
||||
{
|
||||
Ok(mt) => mt,
|
||||
Err(err) => {
|
||||
warn!(
|
||||
"Failed to get metadata/mtime, treating as an expired lock, path: {}, err: {}",
|
||||
path.display(),
|
||||
err
|
||||
);
|
||||
return true; // can't read mtime, treat as expired, so this task will not be starved
|
||||
}
|
||||
};
|
||||
|
||||
match mtime.elapsed() {
|
||||
Ok(elapsed) => elapsed >= threshold,
|
||||
Err(err) => {
|
||||
trace!(
|
||||
"Found mtime in the future, treating as a not expired lock, path: {}, err: {}",
|
||||
path.display(),
|
||||
err
|
||||
);
|
||||
// the lock is expired if the time is too far in the future
|
||||
// it is fine to have network share and not synchronized clocks,
|
||||
// but it's not good when user changes time in their system clock
|
||||
static DEFAULT_THRESHOLD: Duration = Duration::from_secs(60 * 60 * 24); // todo dependant refactor PR adds this as a setting
|
||||
err.duration() > DEFAULT_THRESHOLD
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// todo tests
|
||||
Reference in New Issue
Block a user