//! Import from a real filesystem. use futures::stream::BoxStream; use futures::StreamExt; use std::os::unix::fs::MetadataExt; use std::os::unix::fs::PermissionsExt; use std::path::Path; use tracing::instrument; use walkdir::DirEntry; use walkdir::WalkDir; use crate::blobservice::BlobService; use crate::directoryservice::DirectoryService; use crate::proto::node::Node; use super::ingest_entries; use super::upload_blob_at_path; use super::Error; use super::IngestionEntry; /// Ingests the contents at a given path into the tvix store, interacting with a [BlobService] and /// [DirectoryService]. It returns the root node or an error. /// /// It does not follow symlinks at the root, they will be ingested as actual symlinks. /// /// This function will walk the filesystem using `walkdir` and will consume /// `O(#number of entries)` space. #[instrument(skip(blob_service, directory_service), fields(path), err)] pub async fn ingest_path( blob_service: BS, directory_service: DS, path: P, ) -> Result where P: AsRef + std::fmt::Debug, BS: BlobService + Clone, DS: AsRef, { let iter = WalkDir::new(path.as_ref()) .follow_links(false) .follow_root_links(false) .contents_first(true) .into_iter(); let entries = dir_entries_to_ingestion_stream(blob_service, iter, path.as_ref()); ingest_entries(directory_service, entries).await } /// Converts an iterator of [walkdir::DirEntry]s into a stream of ingestion entries. /// This can then be fed into [ingest_entries] to ingest all the entries into the castore. /// /// The produced stream is buffered, so uploads can happen concurrently. /// /// The root is the [Path] in the filesystem that is being ingested into the castore. pub fn dir_entries_to_ingestion_stream<'a, BS, I>( blob_service: BS, iter: I, root: &'a Path, ) -> BoxStream<'a, Result> where BS: BlobService + Clone + 'a, I: Iterator> + Send + 'a, { let prefix = root.parent().unwrap_or_else(|| Path::new("")); Box::pin( futures::stream::iter(iter) .map(move |x| { let blob_service = blob_service.clone(); async move { match x { Ok(dir_entry) => { dir_entry_to_ingestion_entry(blob_service, &dir_entry, prefix).await } Err(e) => Err(Error::UnableToStat( prefix.to_path_buf(), e.into_io_error().expect("walkdir err must be some"), )), } } }) .buffered(50), ) } /// Converts a [walkdir::DirEntry] into an [IngestionEntry], uploading blobs to the /// provided [BlobService]. /// /// The prefix path is stripped from the path of each entry. This is usually the parent path /// of the path being ingested so that the last element of the stream only has one component. pub async fn dir_entry_to_ingestion_entry( blob_service: BS, entry: &DirEntry, prefix: &Path, ) -> Result where BS: BlobService, { let file_type = entry.file_type(); let path = entry .path() .strip_prefix(prefix) .expect("Tvix bug: failed to strip root path prefix") .to_path_buf(); if file_type.is_dir() { Ok(IngestionEntry::Dir { path }) } else if file_type.is_symlink() { let target = std::fs::read_link(entry.path()) .map_err(|e| Error::UnableToStat(entry.path().to_path_buf(), e))?; Ok(IngestionEntry::Symlink { path, target }) } else if file_type.is_file() { let metadata = entry .metadata() .map_err(|e| Error::UnableToStat(entry.path().to_path_buf(), e.into()))?; let digest = upload_blob_at_path(blob_service, entry.path().to_path_buf()).await?; Ok(IngestionEntry::Regular { path, size: metadata.size(), // If it's executable by the user, it'll become executable. // This matches nix's dump() function behaviour. executable: metadata.permissions().mode() & 64 != 0, digest, }) } else { Ok(IngestionEntry::Unknown { path, file_type }) } }