1 use std
::collections
::{HashMap, VecDeque}
;
3 use std
::io
::{Read, Write, BufRead, BufReader}
;
4 use std
::panic
::UnwindSafe
;
5 use std
::sync
::atomic
::{AtomicBool, Ordering}
;
6 use std
::sync
::{Arc, Mutex}
;
8 use anyhow
::{bail, format_err, Error}
;
10 use lazy_static
::lazy_static
;
12 use serde_json
::{json, Value}
;
13 use serde
::{Serialize, Deserialize}
;
14 use tokio
::sync
::oneshot
;
16 use proxmox
::sys
::linux
::procfs
;
17 use proxmox
::try_block
;
18 use proxmox
::tools
::fs
::{create_path, open_file_locked, replace_file, CreateOptions}
;
22 use crate::tools
::logrotate
::{LogRotate, LogRotateFiles}
;
23 use crate::tools
::{FileLogger, FileLogOptions}
;
24 use crate::api2
::types
::Userid
;
26 macro_rules
! PROXMOX_BACKUP_VAR_RUN_DIR_M { () => ("/run/proxmox-backup") }
27 macro_rules
! PROXMOX_BACKUP_LOG_DIR_M { () => ("/var/log/proxmox-backup") }
28 macro_rules
! PROXMOX_BACKUP_TASK_DIR_M { () => (concat!( PROXMOX_BACKUP_LOG_DIR_M!(), "/tasks")) }
30 pub const PROXMOX_BACKUP_VAR_RUN_DIR
: &str = PROXMOX_BACKUP_VAR_RUN_DIR_M
!();
31 pub const PROXMOX_BACKUP_LOG_DIR
: &str = PROXMOX_BACKUP_LOG_DIR_M
!();
32 pub const PROXMOX_BACKUP_TASK_DIR
: &str = PROXMOX_BACKUP_TASK_DIR_M
!();
33 pub const PROXMOX_BACKUP_TASK_LOCK_FN
: &str = concat
!(PROXMOX_BACKUP_TASK_DIR_M
!(), "/.active.lock");
34 pub const PROXMOX_BACKUP_ACTIVE_TASK_FN
: &str = concat
!(PROXMOX_BACKUP_TASK_DIR_M
!(), "/active");
35 pub const PROXMOX_BACKUP_INDEX_TASK_FN
: &str = concat
!(PROXMOX_BACKUP_TASK_DIR_M
!(), "/index");
36 pub const PROXMOX_BACKUP_ARCHIVE_TASK_FN
: &str = concat
!(PROXMOX_BACKUP_TASK_DIR_M
!(), "/archive");
38 const MAX_INDEX_TASKS
: usize = 1000;
41 static ref WORKER_TASK_LIST
: Mutex
<HashMap
<usize, Arc
<WorkerTask
>>> = Mutex
::new(HashMap
::new());
43 static ref MY_PID
: i32 = unsafe { libc::getpid() }
;
44 static ref MY_PID_PSTART
: u64 = procfs
::PidStat
::read_from_pid(Pid
::from_raw(*MY_PID
))
49 /// Test if the task is still running
50 pub async
fn worker_is_active(upid
: &UPID
) -> Result
<bool
, Error
> {
51 if (upid
.pid
== *MY_PID
) && (upid
.pstart
== *MY_PID_PSTART
) {
52 return Ok(WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
));
55 if !procfs
::check_process_running_pstart(upid
.pid
, upid
.pstart
).is_some() {
59 let socketname
= format
!(
60 "\0{}/proxmox-task-control-{}.sock", PROXMOX_BACKUP_VAR_RUN_DIR
, upid
.pid
);
64 "upid": upid
.to_string(),
67 let status
= super::send_command(socketname
, cmd
).await?
;
69 if let Some(active
) = status
.as_bool() {
72 bail
!("got unexpected result {:?} (expected bool)", status
);
76 /// Test if the task is still running (fast but inaccurate implementation)
78 /// If the task is spanned from a different process, we simply return if
79 /// that process is still running. This information is good enough to detect
81 pub fn worker_is_active_local(upid
: &UPID
) -> bool
{
82 if (upid
.pid
== *MY_PID
) && (upid
.pstart
== *MY_PID_PSTART
) {
83 WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
)
85 procfs
::check_process_running_pstart(upid
.pid
, upid
.pstart
).is_some()
89 pub fn create_task_control_socket() -> Result
<(), Error
> {
91 let socketname
= format
!(
92 "\0{}/proxmox-task-control-{}.sock", PROXMOX_BACKUP_VAR_RUN_DIR
, *MY_PID
);
94 let control_future
= super::create_control_socket(socketname
, |param
| {
97 .ok_or_else(|| format_err
!("unable to parse parameters (expected json object)"))?
;
98 if param
.keys().count() != 2 { bail!("wrong number of parameters"); }
100 let command
= param
["command"]
102 .ok_or_else(|| format_err
!("unable to parse parameters (missing command)"))?
;
104 // we have only two commands for now
105 if !(command
== "abort-task" || command
== "status") {
106 bail
!("got unknown command '{}'", command
);
109 let upid_str
= param
["upid"]
111 .ok_or_else(|| format_err
!("unable to parse parameters (missing upid)"))?
;
113 let upid
= upid_str
.parse
::<UPID
>()?
;
115 if !(upid
.pid
== *MY_PID
&& upid
.pstart
== *MY_PID_PSTART
) {
116 bail
!("upid does not belong to this process");
119 let hash
= WORKER_TASK_LIST
.lock().unwrap();
123 if let Some(ref worker
) = hash
.get(&upid
.task_id
) {
124 worker
.request_abort();
126 // assume task is already stopped
131 let active
= hash
.contains_key(&upid
.task_id
);
135 bail
!("got unknown command '{}'", command
);
140 tokio
::spawn(control_future
);
145 pub fn abort_worker_async(upid
: UPID
) {
146 tokio
::spawn(async
move {
147 if let Err(err
) = abort_worker(upid
).await
{
148 eprintln
!("abort worker failed - {}", err
);
153 pub async
fn abort_worker(upid
: UPID
) -> Result
<(), Error
> {
155 let target_pid
= upid
.pid
;
157 let socketname
= format
!(
158 "\0{}/proxmox-task-control-{}.sock", PROXMOX_BACKUP_VAR_RUN_DIR
, target_pid
);
161 "command": "abort-task",
162 "upid": upid
.to_string(),
165 super::send_command(socketname
, cmd
).map_ok(|_
| ()).await
168 fn parse_worker_status_line(line
: &str) -> Result
<(String
, UPID
, Option
<TaskState
>), Error
> {
170 let data
= line
.splitn(3, ' '
).collect
::<Vec
<&str>>();
172 let len
= data
.len();
175 1 => Ok((data
[0].to_owned(), data
[0].parse
::<UPID
>()?
, None
)),
177 let endtime
= i64::from_str_radix(data
[1], 16)?
;
178 let state
= TaskState
::from_endtime_and_message(endtime
, data
[2])?
;
179 Ok((data
[0].to_owned(), data
[0].parse
::<UPID
>()?
, Some(state
)))
181 _
=> bail
!("wrong number of components"),
185 /// Create task log directory with correct permissions
186 pub fn create_task_log_dirs() -> Result
<(), Error
> {
189 let backup_user
= crate::backup
::backup_user()?
;
190 let opts
= CreateOptions
::new()
191 .owner(backup_user
.uid
)
192 .group(backup_user
.gid
);
194 create_path(PROXMOX_BACKUP_LOG_DIR
, None
, Some(opts
.clone()))?
;
195 create_path(PROXMOX_BACKUP_TASK_DIR
, None
, Some(opts
.clone()))?
;
196 create_path(PROXMOX_BACKUP_VAR_RUN_DIR
, None
, Some(opts
))?
;
198 }).map_err(|err
: Error
| format_err
!("unable to create task log dir - {}", err
))?
;
203 /// Read endtime (time of last log line) and exitstatus from task log file
204 /// If there is not a single line with at valid datetime, we assume the
205 /// starttime to be the endtime
206 pub fn upid_read_status(upid
: &UPID
) -> Result
<TaskState
, Error
> {
208 let mut status
= TaskState
::Unknown { endtime: upid.starttime }
;
210 let path
= upid
.log_path();
212 let mut file
= File
::open(path
)?
;
214 /// speedup - only read tail
216 use std
::io
::SeekFrom
;
217 let _
= file
.seek(SeekFrom
::End(-8192)); // ignore errors
219 let mut data
= Vec
::with_capacity(8192);
220 file
.read_to_end(&mut data
)?
;
222 // task logs should end with newline, we do not want it here
223 if data
.len() > 0 && data
[data
.len()-1] == b'
\n'
{
229 for pos
in (0..data
.len()).rev() {
230 if data
[pos
] == b'
\n'
{
231 start
= data
.len().min(pos
+ 1);
238 let last_line
= std
::str::from_utf8(last_line
)
239 .map_err(|err
| format_err
!("upid_read_status: utf8 parse failed: {}", err
))?
;
241 let mut iter
= last_line
.splitn(2, ": ");
242 if let Some(time_str
) = iter
.next() {
243 if let Ok(endtime
) = proxmox
::tools
::time
::parse_rfc3339(time_str
) {
244 if let Some(rest
) = iter
.next().and_then(|rest
| rest
.strip_prefix("TASK ")) {
245 if let Ok(state
) = TaskState
::from_endtime_and_message(endtime
, rest
) {
256 #[derive(Debug, PartialEq, Eq, Serialize, Deserialize)]
258 /// The Task ended with an undefined state
259 Unknown { endtime: i64 }
,
260 /// The Task ended and there were no errors or warnings
262 /// The Task had 'count' amount of warnings and no errors
263 Warning { count: u64, endtime: i64 }
,
264 /// The Task ended with the error described in 'message'
265 Error { message: String, endtime: i64 }
,
269 pub fn endtime(&self) -> i64 {
271 TaskState
::Unknown { endtime }
=> endtime
,
272 TaskState
::OK { endtime }
=> endtime
,
273 TaskState
::Warning { endtime, .. }
=> endtime
,
274 TaskState
::Error { endtime, .. }
=> endtime
,
278 fn result_text(&self) -> String
{
280 TaskState
::Error { message, .. }
=> format
!("TASK ERROR: {}", message
),
281 other
=> format
!("TASK {}", other
),
285 fn from_endtime_and_message(endtime
: i64, s
: &str) -> Result
<Self, Error
> {
287 Ok(TaskState
::Unknown { endtime }
)
288 } else if s
== "OK" {
289 Ok(TaskState
::OK { endtime }
)
290 } else if s
.starts_with("WARNINGS: ") {
291 let count
: u64 = s
[10..].parse()?
;
292 Ok(TaskState
::Warning{ count, endtime }
)
293 } else if s
.len() > 0 {
294 let message
= if s
.starts_with("ERROR: ") { &s[7..] }
else { s }
.to_string();
295 Ok(TaskState
::Error{ message, endtime }
)
297 bail
!("unable to parse Task Status '{}'", s
);
302 impl std
::cmp
::PartialOrd
for TaskState
{
303 fn partial_cmp(&self, other
: &Self) -> Option
<std
::cmp
::Ordering
> {
304 Some(self.endtime().cmp(&other
.endtime()))
308 impl std
::cmp
::Ord
for TaskState
{
309 fn cmp(&self, other
: &Self) -> std
::cmp
::Ordering
{
310 self.endtime().cmp(&other
.endtime())
314 impl std
::fmt
::Display
for TaskState
{
315 fn fmt(&self, f
: &mut std
::fmt
::Formatter
<'_
>) -> std
::fmt
::Result
{
317 TaskState
::Unknown { .. }
=> write
!(f
, "unknown"),
318 TaskState
::OK { .. }
=> write
!(f
, "OK"),
319 TaskState
::Warning { count, .. }
=> write
!(f
, "WARNINGS: {}", count
),
320 TaskState
::Error { message, .. }
=> write
!(f
, "{}", message
),
325 /// Task details including parsed UPID
327 /// If there is no `state`, the task is still running.
329 pub struct TaskListInfo
{
332 /// UPID string representation
333 pub upid_str
: String
,
334 /// Task `(endtime, status)` if already finished
335 pub state
: Option
<TaskState
>, // endtime, status
338 fn lock_task_list_files(exclusive
: bool
) -> Result
<std
::fs
::File
, Error
> {
339 let backup_user
= crate::backup
::backup_user()?
;
341 let lock
= open_file_locked(PROXMOX_BACKUP_TASK_LOCK_FN
, std
::time
::Duration
::new(10, 0), exclusive
)?
;
342 nix
::unistd
::chown(PROXMOX_BACKUP_TASK_LOCK_FN
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
347 /// checks if the Task Archive is bigger that 'size_threshold' bytes, and
348 /// rotates it if it is
349 pub fn rotate_task_log_archive(size_threshold
: u64, compress
: bool
, max_files
: Option
<usize>) -> Result
<bool
, Error
> {
350 let _lock
= lock_task_list_files(true)?
;
352 let mut logrotate
= LogRotate
::new(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, compress
)
353 .ok_or(format_err
!("could not get archive file names"))?
;
355 logrotate
.rotate(size_threshold
, None
, max_files
)
358 // atomically read/update the task list, update status of finished tasks
359 // new_upid is added to the list when specified.
360 fn update_active_workers(new_upid
: Option
<&UPID
>) -> Result
<(), Error
> {
362 let backup_user
= crate::backup
::backup_user()?
;
364 let lock
= lock_task_list_files(true)?
;
366 let mut finish_list
: Vec
<TaskListInfo
> = read_task_file_from_path(PROXMOX_BACKUP_INDEX_TASK_FN
)?
;
367 let mut active_list
: Vec
<TaskListInfo
> = read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
370 if info
.state
.is_some() {
371 // this can happen when the active file still includes finished tasks
372 finish_list
.push(info
);
376 if !worker_is_active_local(&info
.upid
) {
377 println
!("Detected stopped UPID {}", &info
.upid_str
);
378 let now
= proxmox
::tools
::time
::epoch_i64();
379 let status
= upid_read_status(&info
.upid
)
380 .unwrap_or_else(|_
| TaskState
::Unknown { endtime: now }
);
381 finish_list
.push(TaskListInfo
{
383 upid_str
: info
.upid_str
,
392 if let Some(upid
) = new_upid
{
393 active_list
.push(TaskListInfo { upid: upid.clone(), upid_str: upid.to_string(), state: None }
);
396 let active_raw
= render_task_list(&active_list
);
399 PROXMOX_BACKUP_ACTIVE_TASK_FN
,
400 active_raw
.as_bytes(),
402 .owner(backup_user
.uid
)
403 .group(backup_user
.gid
),
406 finish_list
.sort_unstable_by(|a
, b
| {
407 match (&a
.state
, &b
.state
) {
408 (Some(s1
), Some(s2
)) => s1
.cmp(&s2
),
409 (Some(_
), None
) => std
::cmp
::Ordering
::Less
,
410 (None
, Some(_
)) => std
::cmp
::Ordering
::Greater
,
411 _
=> a
.upid
.starttime
.cmp(&b
.upid
.starttime
),
416 let start
= if finish_list
.len() > MAX_INDEX_TASKS
{
417 finish_list
.len() - MAX_INDEX_TASKS
422 let end
= (start
+MAX_INDEX_TASKS
).min(finish_list
.len());
424 let index_raw
= if end
> start
{
425 render_task_list(&finish_list
[start
..end
])
431 PROXMOX_BACKUP_INDEX_TASK_FN
,
432 index_raw
.as_bytes(),
434 .owner(backup_user
.uid
)
435 .group(backup_user
.gid
),
438 if !finish_list
.is_empty() && start
> 0 {
439 match std
::fs
::OpenOptions
::new().append(true).create(true).open(PROXMOX_BACKUP_ARCHIVE_TASK_FN
) {
441 for info
in &finish_list
[0..start
] {
442 writer
.write_all(render_task_line(&info
).as_bytes())?
;
445 Err(err
) => bail
!("could not write task archive - {}", err
),
448 nix
::unistd
::chown(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
456 fn render_task_line(info
: &TaskListInfo
) -> String
{
457 let mut raw
= String
::new();
458 if let Some(status
) = &info
.state
{
459 raw
.push_str(&format
!("{} {:08X} {}\n", info
.upid_str
, status
.endtime(), status
));
461 raw
.push_str(&info
.upid_str
);
468 fn render_task_list(list
: &[TaskListInfo
]) -> String
{
469 let mut raw
= String
::new();
471 raw
.push_str(&render_task_line(&info
));
476 // note this is not locked, caller has to make sure it is
477 // this will skip (and log) lines that are not valid status lines
478 fn read_task_file
<R
: Read
>(reader
: R
) -> Result
<Vec
<TaskListInfo
>, Error
>
480 let reader
= BufReader
::new(reader
);
481 let mut list
= Vec
::new();
482 for line
in reader
.lines() {
484 match parse_worker_status_line(&line
) {
485 Ok((upid_str
, upid
, state
)) => list
.push(TaskListInfo
{
491 eprintln
!("unable to parse worker status '{}' - {}", line
, err
);
500 // note this is not locked, caller has to make sure it is
501 fn read_task_file_from_path
<P
>(path
: P
) -> Result
<Vec
<TaskListInfo
>, Error
>
503 P
: AsRef
<std
::path
::Path
> + std
::fmt
::Debug
,
505 let file
= match File
::open(&path
) {
507 Err(err
) if err
.kind() == std
::io
::ErrorKind
::NotFound
=> return Ok(Vec
::new()),
508 Err(err
) => bail
!("unable to open task list {:?} - {}", path
, err
),
521 pub struct TaskListInfoIterator
{
522 list
: VecDeque
<TaskListInfo
>,
524 archive
: Option
<LogRotateFiles
>,
528 impl TaskListInfoIterator
{
529 pub fn new(active_only
: bool
) -> Result
<Self, Error
> {
530 let (read_lock
, active_list
) = {
531 let lock
= lock_task_list_files(false)?
;
532 let active_list
= read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
;
534 let needs_update
= active_list
536 .any(|info
| info
.state
.is_some() || !worker_is_active_local(&info
.upid
));
540 update_active_workers(None
)?
;
541 let lock
= lock_task_list_files(false)?
;
542 let active_list
= read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
;
549 let archive
= if active_only
{
552 let logrotate
= LogRotate
::new(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, true)
553 .ok_or_else(|| format_err
!("could not get archive file names"))?
;
554 Some(logrotate
.files())
557 let file
= if active_only { TaskFile::End }
else { TaskFile::Active }
;
558 let lock
= if active_only { None }
else { Some(read_lock) }
;
561 list
: active_list
.into(),
569 impl Iterator
for TaskListInfoIterator
{
570 type Item
= Result
<TaskListInfo
, Error
>;
572 fn next(&mut self) -> Option
<Self::Item
> {
574 if let Some(element
) = self.list
.pop_back() {
575 return Some(Ok(element
));
578 TaskFile
::Active
=> {
579 let index
= match read_task_file_from_path(PROXMOX_BACKUP_INDEX_TASK_FN
) {
581 Err(err
) => return Some(Err(err
)),
583 self.list
.append(&mut index
.into());
584 self.file
= TaskFile
::Index
;
586 TaskFile
::Index
| TaskFile
::Archive
=> {
587 if let Some(mut archive
) = self.archive
.take() {
588 if let Some(file
) = archive
.next() {
589 let list
= match read_task_file(file
) {
591 Err(err
) => return Some(Err(err
)),
593 self.list
.append(&mut list
.into());
594 self.archive
= Some(archive
);
595 self.file
= TaskFile
::Archive
;
599 self.file
= TaskFile
::End
;
603 TaskFile
::End
=> return None
,
610 /// Launch long running worker tasks.
612 /// A worker task can either be a whole thread, or a simply tokio
613 /// task/future. Each task can `log()` messages, which are stored
614 /// persistently to files. Task should poll the `abort_requested`
615 /// flag, and stop execution when requested.
617 pub struct WorkerTask
{
619 data
: Mutex
<WorkerTaskData
>,
620 abort_requested
: AtomicBool
,
623 impl std
::fmt
::Display
for WorkerTask
{
625 fn fmt(&self, f
: &mut std
::fmt
::Formatter
) -> std
::fmt
::Result
{
631 struct WorkerTaskData
{
633 progress
: f64, // 0..1
635 pub abort_listeners
: Vec
<oneshot
::Sender
<()>>,
638 impl Drop
for WorkerTask
{
641 println
!("unregister worker");
647 pub fn new(worker_type
: &str, worker_id
: Option
<String
>, userid
: Userid
, to_stdout
: bool
) -> Result
<Arc
<Self>, Error
> {
648 println
!("register worker");
650 let upid
= UPID
::new(worker_type
, worker_id
, userid
)?
;
651 let task_id
= upid
.task_id
;
653 let mut path
= std
::path
::PathBuf
::from(PROXMOX_BACKUP_TASK_DIR
);
655 path
.push(format
!("{:02X}", upid
.pstart
% 256));
657 let backup_user
= crate::backup
::backup_user()?
;
659 create_path(&path
, None
, Some(CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
)))?
;
661 path
.push(upid
.to_string());
663 println
!("FILE: {:?}", path
);
665 let logger_options
= FileLogOptions
{
666 to_stdout
: to_stdout
,
672 let logger
= FileLogger
::new(&path
, logger_options
)?
;
673 nix
::unistd
::chown(&path
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
675 let worker
= Arc
::new(Self {
677 abort_requested
: AtomicBool
::new(false),
678 data
: Mutex
::new(WorkerTaskData
{
682 abort_listeners
: vec
![],
686 // scope to drop the lock again after inserting
688 let mut hash
= WORKER_TASK_LIST
.lock().unwrap();
689 hash
.insert(task_id
, worker
.clone());
690 super::set_worker_count(hash
.len());
693 update_active_workers(Some(&upid
))?
;
698 /// Spawn a new tokio task/future.
701 worker_id
: Option
<String
>,
705 ) -> Result
<String
, Error
>
706 where F
: Send
+ '
static + FnOnce(Arc
<WorkerTask
>) -> T
,
707 T
: Send
+ '
static + Future
<Output
= Result
<(), Error
>>,
709 let worker
= WorkerTask
::new(worker_type
, worker_id
, userid
, to_stdout
)?
;
710 let upid_str
= worker
.upid
.to_string();
711 let f
= f(worker
.clone());
712 tokio
::spawn(async
move {
713 let result
= f
.await
;
714 worker
.log_result(&result
);
720 /// Create a new worker thread.
721 pub fn new_thread
<F
>(
723 worker_id
: Option
<String
>,
727 ) -> Result
<String
, Error
>
728 where F
: Send
+ UnwindSafe
+ '
static + FnOnce(Arc
<WorkerTask
>) -> Result
<(), Error
>
730 println
!("register worker thread");
732 let worker
= WorkerTask
::new(worker_type
, worker_id
, userid
, to_stdout
)?
;
733 let upid_str
= worker
.upid
.to_string();
735 let _child
= std
::thread
::Builder
::new().name(upid_str
.clone()).spawn(move || {
736 let worker1
= worker
.clone();
737 let result
= match std
::panic
::catch_unwind(move || f(worker1
)) {
740 match panic
.downcast
::<&str>() {
742 Err(format_err
!("worker panicked: {}", panic_msg
))
745 Err(format_err
!("worker panicked: unknown type."))
751 worker
.log_result(&result
);
757 /// create state from self and a result
758 pub fn create_state(&self, result
: &Result
<(), Error
>) -> TaskState
{
759 let warn_count
= self.data
.lock().unwrap().warn_count
;
761 let endtime
= proxmox
::tools
::time
::epoch_i64();
763 if let Err(err
) = result
{
764 TaskState
::Error { message: err.to_string(), endtime }
765 } else if warn_count
> 0 {
766 TaskState
::Warning { count: warn_count, endtime }
768 TaskState
::OK { endtime }
772 /// Log task result, remove task from running list
773 pub fn log_result(&self, result
: &Result
<(), Error
>) {
774 let state
= self.create_state(result
);
775 self.log(state
.result_text());
777 WORKER_TASK_LIST
.lock().unwrap().remove(&self.upid
.task_id
);
778 let _
= update_active_workers(None
);
779 super::set_worker_count(WORKER_TASK_LIST
.lock().unwrap().len());
783 pub fn log
<S
: AsRef
<str>>(&self, msg
: S
) {
784 let mut data
= self.data
.lock().unwrap();
785 data
.logger
.log(msg
);
788 /// Log a message as warning.
789 pub fn warn
<S
: AsRef
<str>>(&self, msg
: S
) {
790 let mut data
= self.data
.lock().unwrap();
791 data
.logger
.log(format
!("WARN: {}", msg
.as_ref()));
792 data
.warn_count
+= 1;
795 /// Set progress indicator
796 pub fn progress(&self, progress
: f64) {
797 if progress
>= 0.0 && progress
<= 1.0 {
798 let mut data
= self.data
.lock().unwrap();
799 data
.progress
= progress
;
801 // fixme: log!("task '{}': ignoring strange value for progress '{}'", self.upid, progress);
806 pub fn request_abort(&self) {
807 eprintln
!("set abort flag for worker {}", self.upid
);
808 self.abort_requested
.store(true, Ordering
::SeqCst
);
810 let mut data
= self.data
.lock().unwrap();
812 match data
.abort_listeners
.pop() {
815 let _
= ch
.send(()); // ignore erros here
821 /// Test if abort was requested.
822 pub fn abort_requested(&self) -> bool
{
823 self.abort_requested
.load(Ordering
::SeqCst
)
826 /// Fail if abort was requested.
827 pub fn fail_on_abort(&self) -> Result
<(), Error
> {
828 if self.abort_requested() {
829 bail
!("abort requested - aborting task");
834 /// Get a future which resolves on task abort
835 pub fn abort_future(&self) -> oneshot
::Receiver
<()> {
836 let (tx
, rx
) = oneshot
::channel
::<()>();
838 let mut data
= self.data
.lock().unwrap();
839 if self.abort_requested() {
842 data
.abort_listeners
.push(tx
);
847 pub fn upid(&self) -> &UPID
{
852 impl crate::task
::TaskState
for WorkerTask
{
853 fn check_abort(&self) -> Result
<(), Error
> {
857 fn log(&self, level
: log
::Level
, message
: &std
::fmt
::Arguments
) {
859 log
::Level
::Error
=> self.warn(&message
.to_string()),
860 log
::Level
::Warn
=> self.warn(&message
.to_string()),
861 log
::Level
::Info
=> self.log(&message
.to_string()),
862 log
::Level
::Debug
=> self.log(&format
!("DEBUG: {}", message
)),
863 log
::Level
::Trace
=> self.log(&format
!("TRACE: {}", message
)),