-
Notifications
You must be signed in to change notification settings - Fork 8
/
wscontents.go
523 lines (431 loc) · 13.3 KB
/
wscontents.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
// Copyright 2022 Namespace Labs Inc; All rights reserved.
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
package wscontents
import (
"bytes"
"context"
"fmt"
"io"
"io/fs"
"os"
"path/filepath"
"time"
"github.com/dustin/go-humanize"
"github.com/fsnotify/fsnotify"
"namespacelabs.dev/foundation/internal/bytestream"
"namespacelabs.dev/foundation/internal/compute"
"namespacelabs.dev/foundation/internal/console"
"namespacelabs.dev/foundation/internal/filewatcher"
"namespacelabs.dev/foundation/internal/fnerrors"
"namespacelabs.dev/foundation/internal/fnfs"
"namespacelabs.dev/foundation/internal/fnfs/digestfs"
"namespacelabs.dev/foundation/internal/fnfs/memfs"
"namespacelabs.dev/foundation/internal/uniquestrings"
"namespacelabs.dev/foundation/internal/workspace/dirs"
"namespacelabs.dev/foundation/schema"
"namespacelabs.dev/foundation/std/tasks"
)
// Observe returns a Computable that is Versioned, that is, it produces a value
// but can also be observed for updates. It produces a new revision whenever the
// filesystem is updated.
// Returns a Computable[Versioned]
func Observe(absPath, rel string, observeChanges bool) compute.Computable[Versioned] {
return &observePath{absPath: absPath, rel: rel, observeChanges: observeChanges}
}
type computeContents struct {
absPath string
compute.DoScoped[fs.FS]
}
var _ compute.Computable[fs.FS] = &computeContents{}
func (cc *computeContents) Action() *tasks.ActionEvent {
return tasks.Action("module.contents.load").Arg("absPath", cc.absPath)
}
func (cc *computeContents) Inputs() *compute.In {
return compute.Inputs().Str("absPath", cc.absPath)
}
func (cc *computeContents) Output() compute.Output {
return compute.Output{NotCacheable: true}
}
func (cc *computeContents) Compute(ctx context.Context, _ compute.Resolved) (fs.FS, error) {
inmem, err := SnapshotContents(ctx, cc.absPath, ".")
if err != nil {
return nil, err
}
return &contentFS{absPath: cc.absPath, fs: inmem}, nil
}
func SnapshotContents(ctx context.Context, modulePath, rel string) (*memfs.FS, error) {
return tasks.Return(ctx, tasks.Action("module.contents.snapshot").Arg("absPath", modulePath).Arg("rel", rel), func(ctx context.Context) (*memfs.FS, error) {
if err := verifyDir(modulePath); err != nil {
return nil, err
}
fsys, err := SnapshotDirectory(ctx, filepath.Join(modulePath, rel))
if err != nil {
return nil, err
}
att := tasks.Attachments(ctx)
att.AddResult("fs.stats", fsys.Stats())
if ts, err := fsys.TotalSize(ctx); err == nil {
att.AddResult("fs.totalSize", humanize.Bytes(ts))
}
return fsys, nil
})
}
func verifyDir(path string) error {
if st, err := os.Stat(path); err != nil {
if os.IsNotExist(err) {
return err
}
return fnerrors.New("%s: accessing the path failed: %v", path, err)
} else if !st.IsDir() {
return fnerrors.New("%s: expected it to be a directory", path)
}
return nil
}
func SnapshotDirectory(ctx context.Context, absPath string) (*memfs.FS, error) {
fsys, err := snapshotDirectory(ctx, absPath)
if err != nil {
return nil, fnerrors.InternalError("snapshot failed: %v", err)
}
return fsys, nil
}
func snapshotDirectory(ctx context.Context, absPath string) (*memfs.FS, error) {
if err := verifyDir(absPath); err != nil {
return nil, err
}
var inmem memfs.FS
if err := filepath.WalkDir(absPath, func(osPathname string, de fs.DirEntry, err error) error {
if err != nil {
return err
}
// TODO: use the exclude/include patterns passed as a config instead.
if dirs.IsExcludedAsSource(osPathname) {
if de.IsDir() {
return filepath.SkipDir
}
return nil
}
if de.IsDir() {
return nil
} else if !de.Type().IsRegular() {
return nil
}
rel, err := filepath.Rel(absPath, osPathname) // XXX expensive?
if err != nil {
return err
}
f, err := os.Open(osPathname)
if err != nil {
return err
}
defer f.Close()
st, err := f.Stat()
if err != nil {
return err
}
// XXX symlinks.
if !st.Mode().IsRegular() {
return nil
}
d, err := inmem.OpenWrite(rel, st.Mode().Perm())
if err != nil {
return err
}
_, err = io.Copy(d, f)
err2 := d.Close()
if err != nil {
return err
}
return err2
}); err != nil {
return nil, err
}
return &inmem, nil
}
type contentFS struct {
absPath string
fs *memfs.FS
}
var _ fs.ReadDirFS = &contentFS{}
var _ fnfs.VisitFS = &contentFS{}
func (fsys *contentFS) Open(name string) (fs.File, error) {
return fsys.fs.Open(name)
}
func (fsys *contentFS) ReadDir(name string) ([]fs.DirEntry, error) {
return fsys.fs.ReadDir(name)
}
func (fsys *contentFS) VisitFiles(ctx context.Context, f func(string, bytestream.ByteStream, fs.DirEntry) error) error {
return fsys.fs.VisitFiles(ctx, f)
}
type observePath struct {
absPath string
rel string
observeChanges bool
compute.DoScoped[Versioned]
}
func (op *observePath) Action() *tasks.ActionEvent {
return tasks.Action("module.contents.observe")
}
func (op *observePath) Inputs() *compute.In {
return compute.Inputs().Str("absPath", op.absPath).Str("rel", op.rel).Bool("observeChanges", op.observeChanges)
}
func (op *observePath) Output() compute.Output {
return compute.Output{NotCacheable: true}
}
func (op *observePath) Compute(ctx context.Context, _ compute.Resolved) (Versioned, error) {
return MakeVersioned(ctx, op.absPath, op.rel, op.observeChanges, nil)
}
// onNewSnapshot is guaranteed to never be called concurrently.
func MakeVersioned(ctx context.Context, moduleAbsPath, rel string, observeChanges bool, onNewSnapshot OnNewSnapshopFunc) (Versioned, error) {
snapshot, err := SnapshotContents(ctx, moduleAbsPath, rel)
if err != nil {
return nil, err
}
var fsys fnfs.ReadWriteFS = snapshot
if onNewSnapshot != nil {
fsys, _, err = onNewSnapshot(ctx, fsys, nil)
if err != nil {
return nil, err
}
}
return &versioned{
absPath: filepath.Join(moduleAbsPath, rel),
fs: fsys,
revision: 1,
errLogger: console.Output(ctx, "file-observer"),
onNewSnapshot: onNewSnapshot,
observeChanges: observeChanges,
}, nil
}
type Versioned interface {
compute.Versioned
compute.Digestible
Abs() string
FS() fs.FS
}
type OnNewSnapshopFunc func(context.Context, fnfs.ReadWriteFS, []*FileEvent) (fnfs.ReadWriteFS, bool, error)
type versioned struct {
absPath string
fs fs.FS
revision uint64
errLogger io.Writer
observeChanges bool
// If available, is called on the updated snapshot before sending an update.
onNewSnapshot OnNewSnapshopFunc
}
var _ compute.Versioned = &versioned{}
func (vp *versioned) Abs() string {
return vp.absPath
}
func (vp *versioned) FS() fs.FS {
return vp.fs
}
func (vp *versioned) ComputeDigest(ctx context.Context) (schema.Digest, error) {
return digestfs.Digest(ctx, vp.fs)
}
func (vp *versioned) Observe(ctx context.Context, onChange func(compute.ResultWithTimestamp[any], bool)) (func(), error) {
if !vp.observeChanges {
return nil, nil
}
// Start with the original snapshot, and with each bundle of events, modify clones of it.
var fsys fnfs.ReadWriteFS
if snapshot, ok := vp.fs.(*memfs.FS); !ok {
return nil, fnerrors.InternalError("expected fs to be a mem snapshot")
} else {
fsys = snapshot.Clone()
}
// XXX we could have an observe model driven from a single watcher, but
// there's a new watcher instantiated per Observe for simplicity for now.
watcher, err := filewatcher.NewFactory(ctx)
if err != nil {
return nil, err
}
if err := fnfs.WalkDir(vp.fs, ".", func(path string, d fs.DirEntry) error {
// TODO: use the exclude/include patterns passed as a config instead.
if dirs.IsExcludedAsSource(path) {
if d.IsDir() {
return fs.SkipDir
}
return nil
}
// Watch every single file and directory in the snapshot.
if d.Type().IsDir() {
return watcher.AddDirectory(filepath.Join(vp.absPath, path))
} else if d.Type().IsRegular() {
return watcher.AddFile(filepath.Join(vp.absPath, path))
}
return nil
}); err != nil {
fmt.Fprintln(vp.errLogger, "watching failed: ", err)
watcher.Close()
return nil, fnerrors.InternalError("failed to walkdir: %v", err)
}
// We keep a buffer of N events over a time window, to avoid too much churn.
bufferCh := make(chan []fsnotify.Event)
go func() {
for buffer := range bufferCh {
newFsys, deliver, err := handleEvents(ctx, console.Debug(ctx), vp.errLogger, vp.absPath, fsys, vp.onNewSnapshot, buffer)
if err != nil {
compute.Stop(ctx, err)
break
}
fsys = newFsys
if !deliver {
// The observer decided to handle actions on their own. But we
// continue to maintain a snapshot with all updates, in case the
// observer changes their mind.
continue
}
r := compute.ResultWithTimestamp[any]{
Completed: time.Now(),
}
vp.revision++
r.Value = &versioned{
absPath: vp.absPath,
fs: fsys,
revision: vp.revision,
errLogger: vp.errLogger,
observeChanges: vp.observeChanges,
}
onChange(r, false)
}
for range bufferCh {
// Drain the channel in case we escaped the loop above, so the go-routine below
// has a chance to observe a canceled context and close the channel.
}
}()
w, err := watcher.StartWatching(ctx)
if err != nil {
return nil, fnerrors.InternalError("failed to start watcher: %v", err)
}
go AggregateFSEvents(w, console.Debug(ctx), vp.errLogger, bufferCh)
return func() {
w.Close()
}, nil
}
func AggregateFSEvents(watcher filewatcher.EventsAndErrors, debugLogger, errLogger io.Writer, bufferCh chan []fsnotify.Event) {
// Usually the return callback would be sole responsible to stop the watcher,
// but we want to free resources as early as we know that we can longer listen
// to events.
defer watcher.Close()
defer close(bufferCh)
t := time.NewTicker(250 * time.Millisecond)
defer func() {
t.Stop()
}()
var buffer []fsnotify.Event
for {
select {
case ev, ok := <-watcher.Events():
if !ok {
return
}
fmt.Fprintf(debugLogger, "Received filesystem event (%s): %v\n", ev.Name, ev.Op)
buffer = append(buffer, ev)
case _, ok := <-t.C:
if ok && len(buffer) > 0 {
bufferCh <- buffer
buffer = nil
}
case err, ok := <-watcher.Errors():
if !ok {
return
}
fmt.Fprintf(errLogger, "Received filesystem event error: %v\n", err)
}
}
}
func handleEvents(ctx context.Context, debugLogger, userVisible io.Writer, absPath string, snapshot fnfs.ReadWriteFS, onNewSnapshot OnNewSnapshopFunc, buffer []fsnotify.Event) (fnfs.ReadWriteFS, bool, error) {
// Coalesce multiple changes.
var dirtyPaths uniquestrings.List
for _, ev := range buffer {
dirtyPaths.Add(ev.Name)
}
fmt.Fprintf(debugLogger, "Coalesced: %v\n", dirtyPaths.Strings())
var actions []*FileEvent
for _, p := range dirtyPaths.Strings() {
// Ignore changes to .swp files (i.e. Vim swap files).
if filepath.Ext(p) == ".swp" && filepath.Base(p)[0] == '.' {
continue
}
rel, err := filepath.Rel(absPath, p)
if err != nil {
return nil, false, fnerrors.InternalError("rel failed: %v", err)
}
action, err := checkChanges(ctx, snapshot, os.DirFS(absPath), rel)
if err != nil {
return nil, false, fnerrors.InternalError("failed to check changes: %v", err)
}
if action != nil {
actions = append(actions, action)
}
}
if len(actions) == 0 {
return snapshot, false, nil
}
var labels []string
for _, p := range actions {
labels = append(labels, fmt.Sprintf("%s:%s", p.Event, p.Path))
var err error
switch p.Event {
case FileEvent_WRITE:
err = fnfs.WriteFile(ctx, snapshot, p.Path, p.NewContents, fs.FileMode(p.Mode))
case FileEvent_REMOVE:
err = snapshot.Remove(p.Path)
case FileEvent_MKDIR:
if mkdirfs, ok := snapshot.(fnfs.MkdirFS); ok {
err = mkdirfs.MkdirAll(p.Path, fs.FileMode(p.Mode))
}
default:
err = fnerrors.InternalError("don't know how to handle %q", p.Event)
}
if err != nil {
return nil, false, fnerrors.InternalError("failed to apply changes to %s: %v", p.Path, err)
}
}
fmt.Fprintf(userVisible, "Detected changes: %v\n", labels)
if onNewSnapshot == nil {
return snapshot, true, nil
}
return onNewSnapshot(ctx, snapshot, actions)
}
func checkChanges(ctx context.Context, snapshot fs.FS, ws fs.FS, path string) (*FileEvent, error) {
f, err := ws.Open(path)
if os.IsNotExist(err) {
if _, err := fs.Stat(snapshot, path); os.IsNotExist(err) {
return nil, nil
}
return &FileEvent{Event: FileEvent_REMOVE, Path: path}, nil
} else if err != nil {
return nil, err
}
defer f.Close()
st, err := f.Stat()
if err != nil {
return nil, err
}
if st.IsDir() {
fi, err := fs.Stat(snapshot, path)
if err != nil {
if os.IsNotExist(err) {
return &FileEvent{Event: FileEvent_MKDIR, Path: path, Mode: uint32(st.Mode().Perm())}, nil
}
return nil, err
}
if fi.IsDir() {
return nil, nil
}
return nil, fnerrors.New("%s: inconsistent event, is a directory in the local workspace but not in the snapshot", path)
}
contents, err := io.ReadAll(f)
if err != nil {
return nil, err
}
existingContents, err := fs.ReadFile(snapshot, path)
if err != nil && !os.IsNotExist(err) {
return nil, err
} else if err == nil && bytes.Equal(contents, existingContents) {
return nil, nil
}
return &FileEvent{Event: FileEvent_WRITE, Path: path, NewContents: contents, Mode: uint32(st.Mode().Perm())}, nil
}