1 use std
::collections
::{HashMap, VecDeque}
;
3 use std
::io
::{Read, Write, BufRead, BufReader}
;
4 use std
::panic
::UnwindSafe
;
5 use std
::sync
::atomic
::{AtomicBool, Ordering}
;
6 use std
::sync
::{Arc, Mutex}
;
8 use anyhow
::{bail, format_err, Error}
;
10 use lazy_static
::lazy_static
;
11 use serde_json
::{json, Value}
;
12 use serde
::{Serialize, Deserialize}
;
13 use tokio
::sync
::oneshot
;
15 use proxmox
::sys
::linux
::procfs
;
16 use proxmox
::try_block
;
17 use proxmox
::tools
::fs
::{create_path, open_file_locked, replace_file, CreateOptions}
;
24 use crate::tools
::logrotate
::{LogRotate, LogRotateFiles}
;
25 use crate::tools
::{FileLogger, FileLogOptions}
;
26 use crate::api2
::types
::{Authid, TaskStateType}
;
28 macro_rules
! taskdir
{
29 ($subdir
:expr
) => (concat
!(pbs_buildcfg
::PROXMOX_BACKUP_LOG_DIR_M
!(), "/tasks", $subdir
))
31 pub const PROXMOX_BACKUP_TASK_DIR
: &str = taskdir
!("/");
32 pub const PROXMOX_BACKUP_TASK_LOCK_FN
: &str = taskdir
!("/.active.lock");
33 pub const PROXMOX_BACKUP_ACTIVE_TASK_FN
: &str = taskdir
!("/active");
34 pub const PROXMOX_BACKUP_INDEX_TASK_FN
: &str = taskdir
!("/index");
35 pub const PROXMOX_BACKUP_ARCHIVE_TASK_FN
: &str = taskdir
!("/archive");
38 static ref WORKER_TASK_LIST
: Mutex
<HashMap
<usize, Arc
<WorkerTask
>>> = Mutex
::new(HashMap
::new());
41 /// checks if the task UPID refers to a worker from this process
42 fn is_local_worker(upid
: &UPID
) -> bool
{
43 upid
.pid
== server
::pid() && upid
.pstart
== server
::pstart()
46 /// Test if the task is still running
47 pub async
fn worker_is_active(upid
: &UPID
) -> Result
<bool
, Error
> {
48 if is_local_worker(upid
) {
49 return Ok(WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
));
52 if procfs
::check_process_running_pstart(upid
.pid
, upid
.pstart
).is_none() {
56 let sock
= server
::ctrl_sock_from_pid(upid
.pid
);
58 "command": "worker-task-status",
60 "upid": upid
.to_string(),
63 let status
= super::send_command(sock
, &cmd
).await?
;
65 if let Some(active
) = status
.as_bool() {
68 bail
!("got unexpected result {:?} (expected bool)", status
);
72 /// Test if the task is still running (fast but inaccurate implementation)
74 /// If the task is spawned from a different process, we simply return if
75 /// that process is still running. This information is good enough to detect
77 pub fn worker_is_active_local(upid
: &UPID
) -> bool
{
78 if is_local_worker(upid
) {
79 WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
)
81 procfs
::check_process_running_pstart(upid
.pid
, upid
.pstart
).is_some()
85 pub fn register_task_control_commands(
86 commando_sock
: &mut super::CommandoSocket
,
87 ) -> Result
<(), Error
> {
88 fn get_upid(args
: Option
<&Value
>) -> Result
<UPID
, Error
> {
89 let args
= if let Some(args
) = args { args }
else { bail!("missing args") }
;
90 let upid
= match args
.get("upid") {
91 Some(Value
::String(upid
)) => upid
.parse
::<UPID
>()?
,
92 None
=> bail
!("no upid in args"),
93 _
=> bail
!("unable to parse upid"),
95 if !is_local_worker(&upid
) {
96 bail
!("upid does not belong to this process");
101 commando_sock
.register_command("worker-task-abort".into(), move |args
| {
102 let upid
= get_upid(args
)?
;
104 if let Some(ref worker
) = WORKER_TASK_LIST
.lock().unwrap().get(&upid
.task_id
) {
105 worker
.request_abort();
109 commando_sock
.register_command("worker-task-status".into(), move |args
| {
110 let upid
= get_upid(args
)?
;
112 let active
= WORKER_TASK_LIST
.lock().unwrap().contains_key(&upid
.task_id
);
120 pub fn abort_worker_async(upid
: UPID
) {
121 tokio
::spawn(async
move {
122 if let Err(err
) = abort_worker(upid
).await
{
123 eprintln
!("abort worker failed - {}", err
);
128 pub async
fn abort_worker(upid
: UPID
) -> Result
<(), Error
> {
130 let sock
= server
::ctrl_sock_from_pid(upid
.pid
);
132 "command": "worker-task-abort",
134 "upid": upid
.to_string(),
137 super::send_command(sock
, &cmd
).map_ok(|_
| ()).await
140 fn parse_worker_status_line(line
: &str) -> Result
<(String
, UPID
, Option
<TaskState
>), Error
> {
142 let data
= line
.splitn(3, ' '
).collect
::<Vec
<&str>>();
144 let len
= data
.len();
147 1 => Ok((data
[0].to_owned(), data
[0].parse
::<UPID
>()?
, None
)),
149 let endtime
= i64::from_str_radix(data
[1], 16)?
;
150 let state
= TaskState
::from_endtime_and_message(endtime
, data
[2])?
;
151 Ok((data
[0].to_owned(), data
[0].parse
::<UPID
>()?
, Some(state
)))
153 _
=> bail
!("wrong number of components"),
157 /// Create task log directory with correct permissions
158 pub fn create_task_log_dirs() -> Result
<(), Error
> {
161 let backup_user
= crate::backup
::backup_user()?
;
162 let opts
= CreateOptions
::new()
163 .owner(backup_user
.uid
)
164 .group(backup_user
.gid
);
166 create_path(pbs_buildcfg
::PROXMOX_BACKUP_LOG_DIR
, None
, Some(opts
.clone()))?
;
167 create_path(PROXMOX_BACKUP_TASK_DIR
, None
, Some(opts
.clone()))?
;
168 create_path(pbs_buildcfg
::PROXMOX_BACKUP_RUN_DIR
, None
, Some(opts
))?
;
170 }).map_err(|err
: Error
| format_err
!("unable to create task log dir - {}", err
))?
;
175 /// Read endtime (time of last log line) and exitstatus from task log file
176 /// If there is not a single line with at valid datetime, we assume the
177 /// starttime to be the endtime
178 pub fn upid_read_status(upid
: &UPID
) -> Result
<TaskState
, Error
> {
180 let mut status
= TaskState
::Unknown { endtime: upid.starttime }
;
182 let path
= upid
.log_path();
184 let mut file
= File
::open(path
)?
;
186 /// speedup - only read tail
188 use std
::io
::SeekFrom
;
189 let _
= file
.seek(SeekFrom
::End(-8192)); // ignore errors
191 let mut data
= Vec
::with_capacity(8192);
192 file
.read_to_end(&mut data
)?
;
194 // strip newlines at the end of the task logs
195 while data
.last() == Some(&b'
\n'
) {
199 let last_line
= match data
.iter().rposition(|c
| *c
== b'
\n'
) {
200 Some(start
) if data
.len() > (start
+1) => &data
[start
+1..],
201 Some(_
) => &data
, // should not happen, since we removed all trailing newlines
205 let last_line
= std
::str::from_utf8(last_line
)
206 .map_err(|err
| format_err
!("upid_read_status: utf8 parse failed: {}", err
))?
;
208 let mut iter
= last_line
.splitn(2, ": ");
209 if let Some(time_str
) = iter
.next() {
210 if let Ok(endtime
) = proxmox
::tools
::time
::parse_rfc3339(time_str
) {
211 // set the endtime even if we cannot parse the state
212 status
= TaskState
::Unknown { endtime }
;
213 if let Some(rest
) = iter
.next().and_then(|rest
| rest
.strip_prefix("TASK ")) {
214 if let Ok(state
) = TaskState
::from_endtime_and_message(endtime
, rest
) {
225 #[derive(Debug, PartialEq, Eq, Serialize, Deserialize)]
227 /// The Task ended with an undefined state
228 Unknown { endtime: i64 }
,
229 /// The Task ended and there were no errors or warnings
231 /// The Task had 'count' amount of warnings and no errors
232 Warning { count: u64, endtime: i64 }
,
233 /// The Task ended with the error described in 'message'
234 Error { message: String, endtime: i64 }
,
238 pub fn endtime(&self) -> i64 {
240 TaskState
::Unknown { endtime }
=> endtime
,
241 TaskState
::OK { endtime }
=> endtime
,
242 TaskState
::Warning { endtime, .. }
=> endtime
,
243 TaskState
::Error { endtime, .. }
=> endtime
,
247 pub fn tasktype(&self) -> TaskStateType
{
249 TaskState
::OK { .. }
=> TaskStateType
::OK
,
250 TaskState
::Unknown { .. }
=> TaskStateType
::Unknown
,
251 TaskState
::Error { .. }
=> TaskStateType
::Error
,
252 TaskState
::Warning { .. }
=> TaskStateType
::Warning
,
256 fn result_text(&self) -> String
{
258 TaskState
::Error { message, .. }
=> format
!("TASK ERROR: {}", message
),
259 other
=> format
!("TASK {}", other
),
263 fn from_endtime_and_message(endtime
: i64, s
: &str) -> Result
<Self, Error
> {
265 Ok(TaskState
::Unknown { endtime }
)
266 } else if s
== "OK" {
267 Ok(TaskState
::OK { endtime }
)
268 } else if let Some(warnings
) = s
.strip_prefix("WARNINGS: ") {
269 let count
: u64 = warnings
.parse()?
;
270 Ok(TaskState
::Warning{ count, endtime }
)
271 } else if !s
.is_empty() {
272 let message
= if let Some(err
) = s
.strip_prefix("ERROR: ") { err }
else { s }
.to_string();
273 Ok(TaskState
::Error{ message, endtime }
)
275 bail
!("unable to parse Task Status '{}'", s
);
280 impl std
::cmp
::PartialOrd
for TaskState
{
281 fn partial_cmp(&self, other
: &Self) -> Option
<std
::cmp
::Ordering
> {
282 Some(self.endtime().cmp(&other
.endtime()))
286 impl std
::cmp
::Ord
for TaskState
{
287 fn cmp(&self, other
: &Self) -> std
::cmp
::Ordering
{
288 self.endtime().cmp(&other
.endtime())
292 impl std
::fmt
::Display
for TaskState
{
293 fn fmt(&self, f
: &mut std
::fmt
::Formatter
<'_
>) -> std
::fmt
::Result
{
295 TaskState
::Unknown { .. }
=> write
!(f
, "unknown"),
296 TaskState
::OK { .. }
=> write
!(f
, "OK"),
297 TaskState
::Warning { count, .. }
=> write
!(f
, "WARNINGS: {}", count
),
298 TaskState
::Error { message, .. }
=> write
!(f
, "{}", message
),
303 /// Task details including parsed UPID
305 /// If there is no `state`, the task is still running.
307 pub struct TaskListInfo
{
310 /// UPID string representation
311 pub upid_str
: String
,
312 /// Task `(endtime, status)` if already finished
313 pub state
: Option
<TaskState
>, // endtime, status
316 fn lock_task_list_files(exclusive
: bool
) -> Result
<std
::fs
::File
, Error
> {
317 let backup_user
= crate::backup
::backup_user()?
;
319 let lock
= open_file_locked(PROXMOX_BACKUP_TASK_LOCK_FN
, std
::time
::Duration
::new(10, 0), exclusive
)?
;
320 nix
::unistd
::chown(PROXMOX_BACKUP_TASK_LOCK_FN
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
325 /// checks if the Task Archive is bigger that 'size_threshold' bytes, and
326 /// rotates it if it is
327 pub fn rotate_task_log_archive(size_threshold
: u64, compress
: bool
, max_files
: Option
<usize>) -> Result
<bool
, Error
> {
328 let _lock
= lock_task_list_files(true)?
;
330 let mut logrotate
= LogRotate
::new(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, compress
)
331 .ok_or_else(|| format_err
!("could not get archive file names"))?
;
333 logrotate
.rotate(size_threshold
, None
, max_files
)
336 // atomically read/update the task list, update status of finished tasks
337 // new_upid is added to the list when specified.
338 fn update_active_workers(new_upid
: Option
<&UPID
>) -> Result
<(), Error
> {
340 let backup_user
= crate::backup
::backup_user()?
;
342 let lock
= lock_task_list_files(true)?
;
344 // TODO remove with 1.x
345 let mut finish_list
: Vec
<TaskListInfo
> = read_task_file_from_path(PROXMOX_BACKUP_INDEX_TASK_FN
)?
;
346 let had_index_file
= !finish_list
.is_empty();
348 // We use filter_map because one negative case wants to *move* the data into `finish_list`,
349 // clippy doesn't quite catch this!
350 #[allow(clippy::unnecessary_filter_map)]
351 let mut active_list
: Vec
<TaskListInfo
> = read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
354 if info
.state
.is_some() {
355 // this can happen when the active file still includes finished tasks
356 finish_list
.push(info
);
360 if !worker_is_active_local(&info
.upid
) {
361 // println!("Detected stopped task '{}'", &info.upid_str);
362 let now
= proxmox
::tools
::time
::epoch_i64();
363 let status
= upid_read_status(&info
.upid
).unwrap_or(TaskState
::Unknown { endtime: now }
);
364 finish_list
.push(TaskListInfo
{
366 upid_str
: info
.upid_str
,
375 if let Some(upid
) = new_upid
{
376 active_list
.push(TaskListInfo { upid: upid.clone(), upid_str: upid.to_string(), state: None }
);
379 let active_raw
= render_task_list(&active_list
);
382 PROXMOX_BACKUP_ACTIVE_TASK_FN
,
383 active_raw
.as_bytes(),
385 .owner(backup_user
.uid
)
386 .group(backup_user
.gid
),
389 finish_list
.sort_unstable_by(|a
, b
| {
390 match (&a
.state
, &b
.state
) {
391 (Some(s1
), Some(s2
)) => s1
.cmp(&s2
),
392 (Some(_
), None
) => std
::cmp
::Ordering
::Less
,
393 (None
, Some(_
)) => std
::cmp
::Ordering
::Greater
,
394 _
=> a
.upid
.starttime
.cmp(&b
.upid
.starttime
),
398 if !finish_list
.is_empty() {
399 match std
::fs
::OpenOptions
::new().append(true).create(true).open(PROXMOX_BACKUP_ARCHIVE_TASK_FN
) {
401 for info
in &finish_list
{
402 writer
.write_all(render_task_line(&info
).as_bytes())?
;
405 Err(err
) => bail
!("could not write task archive - {}", err
),
408 nix
::unistd
::chown(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
411 // TODO Remove with 1.x
412 // for compatibility, if we had an INDEX file, we do not need it anymore
414 let _
= nix
::unistd
::unlink(PROXMOX_BACKUP_INDEX_TASK_FN
);
422 fn render_task_line(info
: &TaskListInfo
) -> String
{
423 let mut raw
= String
::new();
424 if let Some(status
) = &info
.state
{
425 raw
.push_str(&format
!("{} {:08X} {}\n", info
.upid_str
, status
.endtime(), status
));
427 raw
.push_str(&info
.upid_str
);
434 fn render_task_list(list
: &[TaskListInfo
]) -> String
{
435 let mut raw
= String
::new();
437 raw
.push_str(&render_task_line(&info
));
442 // note this is not locked, caller has to make sure it is
443 // this will skip (and log) lines that are not valid status lines
444 fn read_task_file
<R
: Read
>(reader
: R
) -> Result
<Vec
<TaskListInfo
>, Error
>
446 let reader
= BufReader
::new(reader
);
447 let mut list
= Vec
::new();
448 for line
in reader
.lines() {
450 match parse_worker_status_line(&line
) {
451 Ok((upid_str
, upid
, state
)) => list
.push(TaskListInfo
{
457 eprintln
!("unable to parse worker status '{}' - {}", line
, err
);
466 // note this is not locked, caller has to make sure it is
467 fn read_task_file_from_path
<P
>(path
: P
) -> Result
<Vec
<TaskListInfo
>, Error
>
469 P
: AsRef
<std
::path
::Path
> + std
::fmt
::Debug
,
471 let file
= match File
::open(&path
) {
473 Err(err
) if err
.kind() == std
::io
::ErrorKind
::NotFound
=> return Ok(Vec
::new()),
474 Err(err
) => bail
!("unable to open task list {:?} - {}", path
, err
),
480 pub struct TaskListInfoIterator
{
481 list
: VecDeque
<TaskListInfo
>,
483 archive
: Option
<LogRotateFiles
>,
487 impl TaskListInfoIterator
{
488 pub fn new(active_only
: bool
) -> Result
<Self, Error
> {
489 let (read_lock
, active_list
) = {
490 let lock
= lock_task_list_files(false)?
;
491 let active_list
= read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
;
493 let needs_update
= active_list
495 .any(|info
| info
.state
.is_some() || !worker_is_active_local(&info
.upid
));
497 // TODO remove with 1.x
498 let index_exists
= std
::path
::Path
::new(PROXMOX_BACKUP_INDEX_TASK_FN
).is_file();
500 if needs_update
|| index_exists
{
502 update_active_workers(None
)?
;
503 let lock
= lock_task_list_files(false)?
;
504 let active_list
= read_task_file_from_path(PROXMOX_BACKUP_ACTIVE_TASK_FN
)?
;
511 let archive
= if active_only
{
514 let logrotate
= LogRotate
::new(PROXMOX_BACKUP_ARCHIVE_TASK_FN
, true)
515 .ok_or_else(|| format_err
!("could not get archive file names"))?
;
516 Some(logrotate
.files())
519 let lock
= if active_only { None }
else { Some(read_lock) }
;
522 list
: active_list
.into(),
530 impl Iterator
for TaskListInfoIterator
{
531 type Item
= Result
<TaskListInfo
, Error
>;
533 fn next(&mut self) -> Option
<Self::Item
> {
535 if let Some(element
) = self.list
.pop_back() {
536 return Some(Ok(element
));
540 if let Some(mut archive
) = self.archive
.take() {
541 if let Some(file
) = archive
.next() {
542 let list
= match read_task_file(file
) {
544 Err(err
) => return Some(Err(err
)),
546 self.list
.append(&mut list
.into());
547 self.archive
= Some(archive
);
559 /// Launch long running worker tasks.
561 /// A worker task can either be a whole thread, or a simply tokio
562 /// task/future. Each task can `log()` messages, which are stored
563 /// persistently to files. Task should poll the `abort_requested`
564 /// flag, and stop execution when requested.
566 pub struct WorkerTask
{
568 data
: Mutex
<WorkerTaskData
>,
569 abort_requested
: AtomicBool
,
572 impl std
::fmt
::Display
for WorkerTask
{
574 fn fmt(&self, f
: &mut std
::fmt
::Formatter
) -> std
::fmt
::Result
{
580 struct WorkerTaskData
{
582 progress
: f64, // 0..1
584 pub abort_listeners
: Vec
<oneshot
::Sender
<()>>,
589 pub fn new(worker_type
: &str, worker_id
: Option
<String
>, auth_id
: Authid
, to_stdout
: bool
) -> Result
<Arc
<Self>, Error
> {
590 let upid
= UPID
::new(worker_type
, worker_id
, auth_id
)?
;
591 let task_id
= upid
.task_id
;
593 let mut path
= std
::path
::PathBuf
::from(PROXMOX_BACKUP_TASK_DIR
);
595 path
.push(format
!("{:02X}", upid
.pstart
& 255));
597 let backup_user
= crate::backup
::backup_user()?
;
599 create_path(&path
, None
, Some(CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
)))?
;
601 path
.push(upid
.to_string());
603 let logger_options
= FileLogOptions
{
610 let logger
= FileLogger
::new(&path
, logger_options
)?
;
611 nix
::unistd
::chown(&path
, Some(backup_user
.uid
), Some(backup_user
.gid
))?
;
613 let worker
= Arc
::new(Self {
615 abort_requested
: AtomicBool
::new(false),
616 data
: Mutex
::new(WorkerTaskData
{
620 abort_listeners
: vec
![],
624 // scope to drop the lock again after inserting
626 let mut hash
= WORKER_TASK_LIST
.lock().unwrap();
627 hash
.insert(task_id
, worker
.clone());
628 super::set_worker_count(hash
.len());
631 update_active_workers(Some(&upid
))?
;
636 /// Spawn a new tokio task/future.
639 worker_id
: Option
<String
>,
643 ) -> Result
<String
, Error
>
644 where F
: Send
+ '
static + FnOnce(Arc
<WorkerTask
>) -> T
,
645 T
: Send
+ '
static + Future
<Output
= Result
<(), Error
>>,
647 let worker
= WorkerTask
::new(worker_type
, worker_id
, auth_id
, to_stdout
)?
;
648 let upid_str
= worker
.upid
.to_string();
649 let f
= f(worker
.clone());
650 tokio
::spawn(async
move {
651 let result
= f
.await
;
652 worker
.log_result(&result
);
658 /// Create a new worker thread.
659 pub fn new_thread
<F
>(
661 worker_id
: Option
<String
>,
665 ) -> Result
<String
, Error
>
666 where F
: Send
+ UnwindSafe
+ '
static + FnOnce(Arc
<WorkerTask
>) -> Result
<(), Error
>
668 let worker
= WorkerTask
::new(worker_type
, worker_id
, auth_id
, to_stdout
)?
;
669 let upid_str
= worker
.upid
.to_string();
671 let _child
= std
::thread
::Builder
::new().name(upid_str
.clone()).spawn(move || {
672 let worker1
= worker
.clone();
673 let result
= match std
::panic
::catch_unwind(move || f(worker1
)) {
676 match panic
.downcast
::<&str>() {
678 Err(format_err
!("worker panicked: {}", panic_msg
))
681 Err(format_err
!("worker panicked: unknown type."))
687 worker
.log_result(&result
);
693 /// create state from self and a result
694 pub fn create_state(&self, result
: &Result
<(), Error
>) -> TaskState
{
695 let warn_count
= self.data
.lock().unwrap().warn_count
;
697 let endtime
= proxmox
::tools
::time
::epoch_i64();
699 if let Err(err
) = result
{
700 TaskState
::Error { message: err.to_string(), endtime }
701 } else if warn_count
> 0 {
702 TaskState
::Warning { count: warn_count, endtime }
704 TaskState
::OK { endtime }
708 /// Log task result, remove task from running list
709 pub fn log_result(&self, result
: &Result
<(), Error
>) {
710 let state
= self.create_state(result
);
711 self.log(state
.result_text());
713 WORKER_TASK_LIST
.lock().unwrap().remove(&self.upid
.task_id
);
714 let _
= update_active_workers(None
);
715 super::set_worker_count(WORKER_TASK_LIST
.lock().unwrap().len());
719 pub fn log
<S
: AsRef
<str>>(&self, msg
: S
) {
720 let mut data
= self.data
.lock().unwrap();
721 data
.logger
.log(msg
);
724 /// Log a message as warning.
725 pub fn warn
<S
: AsRef
<str>>(&self, msg
: S
) {
726 let mut data
= self.data
.lock().unwrap();
727 data
.logger
.log(format
!("WARN: {}", msg
.as_ref()));
728 data
.warn_count
+= 1;
731 /// Set progress indicator
732 pub fn progress(&self, progress
: f64) {
733 if progress
>= 0.0 && progress
<= 1.0 {
734 let mut data
= self.data
.lock().unwrap();
735 data
.progress
= progress
;
737 // fixme: log!("task '{}': ignoring strange value for progress '{}'", self.upid, progress);
742 pub fn request_abort(&self) {
743 eprintln
!("set abort flag for worker {}", self.upid
);
745 let prev_abort
= self.abort_requested
.swap(true, Ordering
::SeqCst
);
746 if !prev_abort
{ // log abort one time
747 self.log(format
!("received abort request ..."));
750 let mut data
= self.data
.lock().unwrap();
752 match data
.abort_listeners
.pop() {
755 let _
= ch
.send(()); // ignore errors here
761 /// Test if abort was requested.
762 pub fn abort_requested(&self) -> bool
{
763 self.abort_requested
.load(Ordering
::SeqCst
)
766 /// Fail if abort was requested.
767 pub fn fail_on_abort(&self) -> Result
<(), Error
> {
768 if self.abort_requested() {
769 bail
!("abort requested - aborting task");
774 /// Get a future which resolves on task abort
775 pub fn abort_future(&self) -> oneshot
::Receiver
<()> {
776 let (tx
, rx
) = oneshot
::channel
::<()>();
778 let mut data
= self.data
.lock().unwrap();
779 if self.abort_requested() {
782 data
.abort_listeners
.push(tx
);
787 pub fn upid(&self) -> &UPID
{
792 impl crate::task
::TaskState
for WorkerTask
{
793 fn check_abort(&self) -> Result
<(), Error
> {
797 fn log(&self, level
: log
::Level
, message
: &std
::fmt
::Arguments
) {
799 log
::Level
::Error
=> self.warn(&message
.to_string()),
800 log
::Level
::Warn
=> self.warn(&message
.to_string()),
801 log
::Level
::Info
=> self.log(&message
.to_string()),
802 log
::Level
::Debug
=> self.log(&format
!("DEBUG: {}", message
)),
803 log
::Level
::Trace
=> self.log(&format
!("TRACE: {}", message
)),