1 use std
::collections
::{HashMap, VecDeque}
;
3 use std
::io
::{Read, Write, BufRead, BufReader}
;
4 use std
::panic
::UnwindSafe
;
5 use std
::sync
::atomic
::{AtomicBool, Ordering}
;
6 use std
::sync
::{Arc, Mutex}
;
8 use anyhow
::{bail, format_err, Error}
;
10 use lazy_static
::lazy_static
;
11 use serde_json
::{json, Value}
;
12 use serde
::{Serialize, Deserialize}
;
13 use tokio
::sync
::oneshot
;
15 use proxmox
::sys
::linux
::procfs
;
16 use proxmox
::try_block
;
17 use proxmox
::tools
::fs
::{create_path, open_file_locked, replace_file, CreateOptions}
;
23 use crate::tools
::logrotate
::{LogRotate, LogRotateFiles}
;
24 use crate::tools
::{FileLogger, FileLogOptions}
;
25 use crate::api2
::types
::{Authid, TaskStateType}
;
27 macro_rules
! taskdir
{
28 ($subdir
:expr
) => (concat
!(PROXMOX_BACKUP_LOG_DIR_M
!(), "/tasks", $subdir
))
30 pub const PROXMOX_BACKUP_TASK_DIR
: &str = taskdir
!("/");
31 pub const PROXMOX_BACKUP_TASK_LOCK_FN
: &str = taskdir
!("/.active.lock");
32 pub const PROXMOX_BACKUP_ACTIVE_TASK_FN
: &str = taskdir
!("/active");
33 pub const PROXMOX_BACKUP_INDEX_TASK_FN
: &str = taskdir
!("/index");
34 pub const PROXMOX_BACKUP_ARCHIVE_TASK_FN
: &str = taskdir
!("/archive");
37 static ref WORKER_TASK_LIST
: Mutex
<HashMap
<usize, Arc
<WorkerTask
>>> = Mutex
::new(HashMap
::new());
40 /// checks if the task UPID refers to a worker from this process
41 fn is_local_worker(upid
: &UPID
) -> bool
{
42 upid
.pid
== server
::pid() && upid
.pstart
== server
::pstart()
45 /// Test if the task is still running
46 pub async
fn worker_is_active(upid
: &UPID
) -> Result
<bool
, Error
> {
47 if is_local_worker(upid
) {
48 return Ok(WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
));
51 if procfs
::check_process_running_pstart(upid
.pid
, upid
.pstart
).is_none() {
55 let sock
= server
::ctrl_sock_from_pid(upid
.pid
);
57 "command": "worker-task-status",
59 "upid": upid
.to_string(),
62 let status
= super::send_command(sock
, &cmd
).await?
;
64 if let Some(active
) = status
.as_bool() {
67 bail
!("got unexpected result {:?} (expected bool)", status
);
71 /// Test if the task is still running (fast but inaccurate implementation)
73 /// If the task is spawned from a different process, we simply return if
74 /// that process is still running. This information is good enough to detect
76 pub fn worker_is_active_local(upid
: &UPID
) -> bool
{
77 if is_local_worker(upid
) {
78 WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
)
80 procfs
::check_process_running_pstart(upid
.pid
, upid
.pstart
).is_some()
84 pub fn register_task_control_commands(
85 commando_sock
: &mut super::CommandoSocket
,
86 ) -> Result
<(), Error
> {
87 fn get_upid(args
: Option
<&Value
>) -> Result
<UPID
, Error
> {
88 let args
= if let Some(args
) = args { args }
else { bail!("missing args") }
;
89 let upid
= match args
.get("upid") {
90 Some(Value
::String(upid
)) => upid
.parse
::<UPID
>()?
,
91 None
=> bail
!("no upid in args"),
92 _
=> bail
!("unable to parse upid"),
94 if !is_local_worker(&upid
) {
95 bail
!("upid does not belong to this process");
100 commando_sock
.register_command("worker-task-abort".into(), move |args
| {
101 let upid
= get_upid(args
)?
;
103 if let Some(ref worker
) = WORKER_TASK_LIST
.lock().unwrap().get(&upid
.task_id
) {
104 worker
.request_abort();
108 commando_sock
.register_command("worker-task-status".into(), move |args
| {
109 let upid
= get_upid(args
)?
;
111 let active
= WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
);
119 pub fn abort_worker_async(upid
: UPID
) {
120 tokio
::spawn(async
move {
121 if let Err(err
) = abort_worker(upid
).await
{
122 eprintln
!("abort worker failed - {}", err
);
127 pub async
fn abort_worker(upid
: UPID
) -> Result
<(), Error
> {
129 let sock
= server
::ctrl_sock_from_pid(upid
.pid
);
131 "command": "worker-task-abort",
133 "upid": upid
.to_string(),
136 super::send_command(sock
, &cmd
).map_ok(|_
| ()).await
139 fn parse_worker_status_line(line
: &str) -> Result
<(String
, UPID
, Option
<TaskState
>), Error
> {
141 let data
= line
.splitn(3, ' '
).collect
::<Vec
<&str>>();
143 let len
= data
.len();
146 1 => Ok((data
[0].to_owned(), data
[0].parse
::<UPID
>()?
, None
)),
148 let endtime
= i64::from_str_radix(data
[1], 16)?
;
149 let state
= TaskState
::from_endtime_and_message(endtime
, data
[2])?
;
150 Ok((data
[0].to_owned(), data
[0].parse
::<UPID
>()?
, Some(state
)))
152 _
=> bail
!("wrong number of components"),
156 /// Create task log directory with correct permissions
157 pub fn create_task_log_dirs() -> Result
<(), Error
> {
160 let backup_user
= crate::backup
::backup_user()?
;
161 let opts
= CreateOptions
::new()
162 .owner(backup_user
.uid
)
163 .group(backup_user
.gid
);
165 create_path(buildcfg
::PROXMOX_BACKUP_LOG_DIR
, None
, Some(opts
.clone()))?
;
166 create_path(PROXMOX_BACKUP_TASK_DIR
, None
, Some(opts
.clone()))?
;
167 create_path(buildcfg
::PROXMOX_BACKUP_RUN_DIR
, None
, Some(opts
))?
;
169 }).map_err(|err
: Error
| format_err
!("unable to create task log dir - {}", err
))?
;
174 /// Read endtime (time of last log line) and exitstatus from task log file
175 /// If there is not a single line with at valid datetime, we assume the
176 /// starttime to be the endtime
177 pub fn upid_read_status(upid
: &UPID
) -> Result
<TaskState
, Error
> {
179 let mut status
= TaskState
::Unknown { endtime: upid.starttime }
;
181 let path
= upid
.log_path();
183 let mut file
= File
::open(path
)?
;
185 /// speedup - only read tail
187 use std
::io
::SeekFrom
;
188 let _
= file
.seek(SeekFrom
::End(-8192)); // ignore errors
190 let mut data
= Vec
::with_capacity(8192);
191 file
.read_to_end(&mut data
)?
;
193 // strip newlines at the end of the task logs
194 while data
.last() == Some(&b'
\n'
) {
198 let last_line
= match data
.iter().rposition(|c
| *c
== b'
\n'
) {
199 Some(start
) if data
.len() > (start
+1) => &data
[start
+1..],
200 Some(_
) => &data
, // should not happen, since we removed all trailing newlines
204 let last_line
= std
::str::from_utf8(last_line
)
205 .map_err(|err
| format_err
!("upid_read_status: utf8 parse failed: {}", err
))?
;
207 let mut iter
= last_line
.splitn(2, ": ");
208 if let Some(time_str
) = iter
.next() {
209 if let Ok(endtime
) = proxmox
::tools
::time
::parse_rfc3339(time_str
) {
210 // set the endtime even if we cannot parse the state
211 status
= TaskState
::Unknown { endtime }
;
212 if let Some(rest
) = iter
.next().and_then(|rest
| rest
.strip_prefix("TASK ")) {
213 if let Ok(state
) = TaskState
::from_endtime_and_message(endtime
, rest
) {
224 #[derive(Debug, PartialEq, Eq, Serialize, Deserialize)]
226 /// The Task ended with an undefined state
227 Unknown { endtime: i64 }
,
228 /// The Task ended and there were no errors or warnings
230 /// The Task had 'count' amount of warnings and no errors
231 Warning { count: u64, endtime: i64 }
,
232 /// The Task ended with the error described in 'message'
233 Error { message: String, endtime: i64 }
,
237 pub fn endtime(&self) -> i64 {
239 TaskState
::Unknown { endtime }
=> endtime
,
240 TaskState
::OK { endtime }
=> endtime
,
241 TaskState
::Warning { endtime, .. }
=> endtime
,
242 TaskState
::Error { endtime, .. }
=> endtime
,
246 pub fn tasktype(&self) -> TaskStateType
{
248 TaskState
::OK { .. }
=> TaskStateType
::OK
,
249 TaskState
::Unknown { .. }
=> TaskStateType
::Unknown
,
250 TaskState
::Error { .. }
=> TaskStateType
::Error
,
251 TaskState
::Warning { .. }
=> TaskStateType
::Warning
,
255 fn result_text(&self) -> String
{
257 TaskState
::Error { message, .. }
=> format
!("TASK ERROR: {}", message
),
258 other
=> format
!("TASK {}", other
),
262 fn from_endtime_and_message(endtime
: i64, s
: &str) -> Result
<Self, Error
> {
264 Ok(TaskState
::Unknown { endtime }
)
265 } else if s
== "OK" {
266 Ok(TaskState
::OK { endtime }
)
267 } else if let Some(warnings
) = s
.strip_prefix("WARNINGS: ") {
268 let count
: u64 = warnings
.parse()?
;
269 Ok(TaskState
::Warning{ count, endtime }
)
270 } else if !s
.is_empty() {
271 let message
= if let Some(err
) = s
.strip_prefix("ERROR: ") { err }
else { s }
.to_string();
272 Ok(TaskState
::Error{ message, endtime }
)
274 bail
!("unable to parse Task Status '{}'", s
);
279 impl std
::cmp
::PartialOrd
for TaskState
{
280 fn partial_cmp(&self, other
: &Self) -> Option
<std
::cmp
::Ordering
> {
281 Some(self.endtime().cmp(&other
.endtime()))
285 impl std
::cmp
::Ord
for TaskState
{
286 fn cmp(&self, other
: &Self) -> std
::cmp
::Ordering
{
287 self.endtime().cmp(&other
.endtime())
291 impl std
::fmt
::Display
for TaskState
{
292 fn fmt(&self, f
: &mut std
::fmt
::Formatter
<'_
>) -> std
::fmt
::Result
{
294 TaskState
::Unknown { .. }
=> write
!(f
, "unknown"),
295 TaskState
::OK { .. }
=> write
!(f
, "OK"),
296 TaskState
::Warning { count, .. }
=> write
!(f
, "WARNINGS: {}", count
),
297 TaskState
::Error { message, .. }
=> write
!(f
, "{}", message
),
302 /// Task details including parsed UPID
304 /// If there is no `state`, the task is still running.
306 pub struct TaskListInfo
{
309 /// UPID string representation
310 pub upid_str
: String
,
311 /// Task `(endtime, status)` if already finished
312 pub state
: Option
<TaskState
>, // endtime, status
315 fn lock_task_list_files(exclusive
: bool
) -> Result
<std
::fs
::File
, Error
> {
316 let backup_user
= crate::backup
::backup_user()?
;
318 let lock
= open_file_locked(PROXMOX_BACKUP_TASK_LOCK_FN
, std
::time
::Duration
::new(10, 0), exclusive
)?
;
319 nix
::unistd
::chown(PROXMOX_BACKUP_TASK_LOCK_FN
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
324 /// checks if the Task Archive is bigger that 'size_threshold' bytes, and
325 /// rotates it if it is
326 pub fn rotate_task_log_archive(size_threshold
: u64, compress
: bool
, max_files
: Option
<usize>) -> Result
<bool
, Error
> {
327 let _lock
= lock_task_list_files(true)?
;
329 let mut logrotate
= LogRotate
::new(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, compress
)
330 .ok_or_else(|| format_err
!("could not get archive file names"))?
;
332 logrotate
.rotate(size_threshold
, None
, max_files
)
335 // atomically read/update the task list, update status of finished tasks
336 // new_upid is added to the list when specified.
337 fn update_active_workers(new_upid
: Option
<&UPID
>) -> Result
<(), Error
> {
339 let backup_user
= crate::backup
::backup_user()?
;
341 let lock
= lock_task_list_files(true)?
;
343 // TODO remove with 1.x
344 let mut finish_list
: Vec
<TaskListInfo
> = read_task_file_from_path(PROXMOX_BACKUP_INDEX_TASK_FN
)?
;
345 let had_index_file
= !finish_list
.is_empty();
347 // We use filter_map because one negative case wants to *move* the data into `finish_list`,
348 // clippy doesn't quite catch this!
349 #[allow(clippy::unnecessary_filter_map)]
350 let mut active_list
: Vec
<TaskListInfo
> = read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
353 if info
.state
.is_some() {
354 // this can happen when the active file still includes finished tasks
355 finish_list
.push(info
);
359 if !worker_is_active_local(&info
.upid
) {
360 // println!("Detected stopped task '{}'", &info.upid_str);
361 let now
= proxmox
::tools
::time
::epoch_i64();
362 let status
= upid_read_status(&info
.upid
).unwrap_or(TaskState
::Unknown { endtime: now }
);
363 finish_list
.push(TaskListInfo
{
365 upid_str
: info
.upid_str
,
374 if let Some(upid
) = new_upid
{
375 active_list
.push(TaskListInfo { upid: upid.clone(), upid_str: upid.to_string(), state: None }
);
378 let active_raw
= render_task_list(&active_list
);
381 PROXMOX_BACKUP_ACTIVE_TASK_FN
,
382 active_raw
.as_bytes(),
384 .owner(backup_user
.uid
)
385 .group(backup_user
.gid
),
388 finish_list
.sort_unstable_by(|a
, b
| {
389 match (&a
.state
, &b
.state
) {
390 (Some(s1
), Some(s2
)) => s1
.cmp(&s2
),
391 (Some(_
), None
) => std
::cmp
::Ordering
::Less
,
392 (None
, Some(_
)) => std
::cmp
::Ordering
::Greater
,
393 _
=> a
.upid
.starttime
.cmp(&b
.upid
.starttime
),
397 if !finish_list
.is_empty() {
398 match std
::fs
::OpenOptions
::new().append(true).create(true).open(PROXMOX_BACKUP_ARCHIVE_TASK_FN
) {
400 for info
in &finish_list
{
401 writer
.write_all(render_task_line(&info
).as_bytes())?
;
404 Err(err
) => bail
!("could not write task archive - {}", err
),
407 nix
::unistd
::chown(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
410 // TODO Remove with 1.x
411 // for compatibility, if we had an INDEX file, we do not need it anymore
413 let _
= nix
::unistd
::unlink(PROXMOX_BACKUP_INDEX_TASK_FN
);
421 fn render_task_line(info
: &TaskListInfo
) -> String
{
422 let mut raw
= String
::new();
423 if let Some(status
) = &info
.state
{
424 raw
.push_str(&format
!("{} {:08X} {}\n", info
.upid_str
, status
.endtime(), status
));
426 raw
.push_str(&info
.upid_str
);
433 fn render_task_list(list
: &[TaskListInfo
]) -> String
{
434 let mut raw
= String
::new();
436 raw
.push_str(&render_task_line(&info
));
441 // note this is not locked, caller has to make sure it is
442 // this will skip (and log) lines that are not valid status lines
443 fn read_task_file
<R
: Read
>(reader
: R
) -> Result
<Vec
<TaskListInfo
>, Error
>
445 let reader
= BufReader
::new(reader
);
446 let mut list
= Vec
::new();
447 for line
in reader
.lines() {
449 match parse_worker_status_line(&line
) {
450 Ok((upid_str
, upid
, state
)) => list
.push(TaskListInfo
{
456 eprintln
!("unable to parse worker status '{}' - {}", line
, err
);
465 // note this is not locked, caller has to make sure it is
466 fn read_task_file_from_path
<P
>(path
: P
) -> Result
<Vec
<TaskListInfo
>, Error
>
468 P
: AsRef
<std
::path
::Path
> + std
::fmt
::Debug
,
470 let file
= match File
::open(&path
) {
472 Err(err
) if err
.kind() == std
::io
::ErrorKind
::NotFound
=> return Ok(Vec
::new()),
473 Err(err
) => bail
!("unable to open task list {:?} - {}", path
, err
),
479 pub struct TaskListInfoIterator
{
480 list
: VecDeque
<TaskListInfo
>,
482 archive
: Option
<LogRotateFiles
>,
486 impl TaskListInfoIterator
{
487 pub fn new(active_only
: bool
) -> Result
<Self, Error
> {
488 let (read_lock
, active_list
) = {
489 let lock
= lock_task_list_files(false)?
;
490 let active_list
= read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
;
492 let needs_update
= active_list
494 .any(|info
| info
.state
.is_some() || !worker_is_active_local(&info
.upid
));
496 // TODO remove with 1.x
497 let index_exists
= std
::path
::Path
::new(PROXMOX_BACKUP_INDEX_TASK_FN
).is_file();
499 if needs_update
|| index_exists
{
501 update_active_workers(None
)?
;
502 let lock
= lock_task_list_files(false)?
;
503 let active_list
= read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
;
510 let archive
= if active_only
{
513 let logrotate
= LogRotate
::new(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, true)
514 .ok_or_else(|| format_err
!("could not get archive file names"))?
;
515 Some(logrotate
.files())
518 let lock
= if active_only { None }
else { Some(read_lock) }
;
521 list
: active_list
.into(),
529 impl Iterator
for TaskListInfoIterator
{
530 type Item
= Result
<TaskListInfo
, Error
>;
532 fn next(&mut self) -> Option
<Self::Item
> {
534 if let Some(element
) = self.list
.pop_back() {
535 return Some(Ok(element
));
539 if let Some(mut archive
) = self.archive
.take() {
540 if let Some(file
) = archive
.next() {
541 let list
= match read_task_file(file
) {
543 Err(err
) => return Some(Err(err
)),
545 self.list
.append(&mut list
.into());
546 self.archive
= Some(archive
);
558 /// Launch long running worker tasks.
560 /// A worker task can either be a whole thread, or a simply tokio
561 /// task/future. Each task can `log()` messages, which are stored
562 /// persistently to files. Task should poll the `abort_requested`
563 /// flag, and stop execution when requested.
565 pub struct WorkerTask
{
567 data
: Mutex
<WorkerTaskData
>,
568 abort_requested
: AtomicBool
,
571 impl std
::fmt
::Display
for WorkerTask
{
573 fn fmt(&self, f
: &mut std
::fmt
::Formatter
) -> std
::fmt
::Result
{
579 struct WorkerTaskData
{
581 progress
: f64, // 0..1
583 pub abort_listeners
: Vec
<oneshot
::Sender
<()>>,
588 pub fn new(worker_type
: &str, worker_id
: Option
<String
>, auth_id
: Authid
, to_stdout
: bool
) -> Result
<Arc
<Self>, Error
> {
589 let upid
= UPID
::new(worker_type
, worker_id
, auth_id
)?
;
590 let task_id
= upid
.task_id
;
592 let mut path
= std
::path
::PathBuf
::from(PROXMOX_BACKUP_TASK_DIR
);
594 path
.push(format
!("{:02X}", upid
.pstart
& 255));
596 let backup_user
= crate::backup
::backup_user()?
;
598 create_path(&path
, None
, Some(CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
)))?
;
600 path
.push(upid
.to_string());
602 let logger_options
= FileLogOptions
{
609 let logger
= FileLogger
::new(&path
, logger_options
)?
;
610 nix
::unistd
::chown(&path
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
612 let worker
= Arc
::new(Self {
614 abort_requested
: AtomicBool
::new(false),
615 data
: Mutex
::new(WorkerTaskData
{
619 abort_listeners
: vec
![],
623 // scope to drop the lock again after inserting
625 let mut hash
= WORKER_TASK_LIST
.lock().unwrap();
626 hash
.insert(task_id
, worker
.clone());
627 super::set_worker_count(hash
.len());
630 update_active_workers(Some(&upid
))?
;
635 /// Spawn a new tokio task/future.
638 worker_id
: Option
<String
>,
642 ) -> Result
<String
, Error
>
643 where F
: Send
+ '
static + FnOnce(Arc
<WorkerTask
>) -> T
,
644 T
: Send
+ '
static + Future
<Output
= Result
<(), Error
>>,
646 let worker
= WorkerTask
::new(worker_type
, worker_id
, auth_id
, to_stdout
)?
;
647 let upid_str
= worker
.upid
.to_string();
648 let f
= f(worker
.clone());
649 tokio
::spawn(async
move {
650 let result
= f
.await
;
651 worker
.log_result(&result
);
657 /// Create a new worker thread.
658 pub fn new_thread
<F
>(
660 worker_id
: Option
<String
>,
664 ) -> Result
<String
, Error
>
665 where F
: Send
+ UnwindSafe
+ '
static + FnOnce(Arc
<WorkerTask
>) -> Result
<(), Error
>
667 let worker
= WorkerTask
::new(worker_type
, worker_id
, auth_id
, to_stdout
)?
;
668 let upid_str
= worker
.upid
.to_string();
670 let _child
= std
::thread
::Builder
::new().name(upid_str
.clone()).spawn(move || {
671 let worker1
= worker
.clone();
672 let result
= match std
::panic
::catch_unwind(move || f(worker1
)) {
675 match panic
.downcast
::<&str>() {
677 Err(format_err
!("worker panicked: {}", panic_msg
))
680 Err(format_err
!("worker panicked: unknown type."))
686 worker
.log_result(&result
);
692 /// create state from self and a result
693 pub fn create_state(&self, result
: &Result
<(), Error
>) -> TaskState
{
694 let warn_count
= self.data
.lock().unwrap().warn_count
;
696 let endtime
= proxmox
::tools
::time
::epoch_i64();
698 if let Err(err
) = result
{
699 TaskState
::Error { message: err.to_string(), endtime }
700 } else if warn_count
> 0 {
701 TaskState
::Warning { count: warn_count, endtime }
703 TaskState
::OK { endtime }
707 /// Log task result, remove task from running list
708 pub fn log_result(&self, result
: &Result
<(), Error
>) {
709 let state
= self.create_state(result
);
710 self.log(state
.result_text());
712 WORKER_TASK_LIST
.lock().unwrap().remove(&self.upid
.task_id
);
713 let _
= update_active_workers(None
);
714 super::set_worker_count(WORKER_TASK_LIST
.lock().unwrap().len());
718 pub fn log
<S
: AsRef
<str>>(&self, msg
: S
) {
719 let mut data
= self.data
.lock().unwrap();
720 data
.logger
.log(msg
);
723 /// Log a message as warning.
724 pub fn warn
<S
: AsRef
<str>>(&self, msg
: S
) {
725 let mut data
= self.data
.lock().unwrap();
726 data
.logger
.log(format
!("WARN: {}", msg
.as_ref()));
727 data
.warn_count
+= 1;
730 /// Set progress indicator
731 pub fn progress(&self, progress
: f64) {
732 if progress
>= 0.0 && progress
<= 1.0 {
733 let mut data
= self.data
.lock().unwrap();
734 data
.progress
= progress
;
736 // fixme: log!("task '{}': ignoring strange value for progress '{}'", self.upid, progress);
741 pub fn request_abort(&self) {
742 eprintln
!("set abort flag for worker {}", self.upid
);
744 let prev_abort
= self.abort_requested
.swap(true, Ordering
::SeqCst
);
745 if !prev_abort
{ // log abort one time
746 self.log(format
!("received abort request ..."));
749 let mut data
= self.data
.lock().unwrap();
751 match data
.abort_listeners
.pop() {
754 let _
= ch
.send(()); // ignore errors here
760 /// Test if abort was requested.
761 pub fn abort_requested(&self) -> bool
{
762 self.abort_requested
.load(Ordering
::SeqCst
)
765 /// Fail if abort was requested.
766 pub fn fail_on_abort(&self) -> Result
<(), Error
> {
767 if self.abort_requested() {
768 bail
!("abort requested - aborting task");
773 /// Get a future which resolves on task abort
774 pub fn abort_future(&self) -> oneshot
::Receiver
<()> {
775 let (tx
, rx
) = oneshot
::channel
::<()>();
777 let mut data
= self.data
.lock().unwrap();
778 if self.abort_requested() {
781 data
.abort_listeners
.push(tx
);
786 pub fn upid(&self) -> &UPID
{
791 impl crate::task
::TaskState
for WorkerTask
{
792 fn check_abort(&self) -> Result
<(), Error
> {
796 fn log(&self, level
: log
::Level
, message
: &std
::fmt
::Arguments
) {
798 log
::Level
::Error
=> self.warn(&message
.to_string()),
799 log
::Level
::Warn
=> self.warn(&message
.to_string()),
800 log
::Level
::Info
=> self.log(&message
.to_string()),
801 log
::Level
::Debug
=> self.log(&format
!("DEBUG: {}", message
)),
802 log
::Level
::Trace
=> self.log(&format
!("TRACE: {}", message
)),