use super::PathInfoService; use crate::{nar::calculate_size_and_sha256, proto::PathInfo}; use futures::{stream::iter, Stream}; use std::{ collections::HashMap, pin::Pin, sync::{Arc, RwLock}, }; use tonic::async_trait; use tvix_castore::proto as castorepb; use tvix_castore::Error; use tvix_castore::{blobservice::BlobService, directoryservice::DirectoryService}; pub struct MemoryPathInfoService { db: Arc>>, blob_service: Arc, directory_service: Arc, } impl MemoryPathInfoService { pub fn new( blob_service: Arc, directory_service: Arc, ) -> Self { Self { db: Default::default(), blob_service, directory_service, } } } #[async_trait] impl PathInfoService for MemoryPathInfoService { async fn get(&self, digest: [u8; 20]) -> Result, Error> { let db = self.db.read().unwrap(); match db.get(&digest) { None => Ok(None), Some(path_info) => Ok(Some(path_info.clone())), } } async fn put(&self, path_info: PathInfo) -> Result { // Call validate on the received PathInfo message. match path_info.validate() { Err(e) => Err(Error::InvalidRequest(format!( "failed to validate PathInfo: {}", e ))), // In case the PathInfo is valid, and we were able to extract a NixPath, store it in the database. // This overwrites existing PathInfo objects. Ok(nix_path) => { let mut db = self.db.write().unwrap(); db.insert(*nix_path.digest(), path_info.clone()); Ok(path_info) } } } async fn calculate_nar( &self, root_node: &castorepb::node::Node, ) -> Result<(u64, [u8; 32]), Error> { calculate_size_and_sha256( root_node, self.blob_service.clone(), self.directory_service.clone(), ) .await .map_err(|e| Error::StorageError(e.to_string())) } fn list(&self) -> Pin> + Send>> { let db = self.db.read().unwrap(); // Copy all elements into a list. // This is a bit ugly, because we can't have db escape the lifetime // of this function, but elements need to be returned owned anyways, and this in- // memory impl is only for testing purposes anyways. let items: Vec<_> = db.iter().map(|(_k, v)| Ok(v.clone())).collect(); Box::pin(iter(items)) } }