blob: cf625e0682aabc42f32cc9adba015ca8e94d0a13 [file] [log] [blame]
Damien Martin-Guillerezf88f4d82015-09-25 13:56:55 +00001// Copyright 2015 The Bazel Authors. All rights reserved.
Mark Schallerb889cf32015-03-17 20:55:30 +00002//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14package com.google.devtools.build.lib.skyframe;
15
Googler16b2be12024-03-06 10:04:22 -080016import static com.google.common.base.Throwables.throwIfInstanceOf;
janakrb8bc2842021-12-08 12:48:02 -080017import static com.google.common.util.concurrent.Futures.immediateCancelledFuture;
18import static com.google.common.util.concurrent.Futures.immediateFailedFuture;
Googler3d37b4c2017-04-25 04:19:01 +020019import static com.google.common.util.concurrent.MoreExecutors.directExecutor;
Eric Fellheimer8c40daa2016-01-11 17:31:26 +000020
Eric Fellheimer6f8b7ce2016-01-29 00:15:44 +000021import com.google.common.base.Throwables;
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +000022import com.google.common.collect.ImmutableMap;
Mark Schallerf6e32d62015-05-19 20:27:43 +000023import com.google.common.collect.ImmutableSet;
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +000024import com.google.common.collect.Iterables;
Eric Fellheimerfb601432016-03-07 21:14:44 +000025import com.google.common.collect.Sets;
Nathan Harmata7a5a2362017-03-08 22:42:01 +000026import com.google.common.util.concurrent.Futures;
27import com.google.common.util.concurrent.ListenableFuture;
28import com.google.common.util.concurrent.ListeningExecutorService;
Nathan Harmata5bd26b22016-11-14 19:55:50 +000029import com.google.common.util.concurrent.MoreExecutors;
janakrb8bc2842021-12-08 12:48:02 -080030import com.google.common.util.concurrent.Uninterruptibles;
janakrbe525302021-11-16 14:45:58 -080031import com.google.devtools.build.lib.cmdline.BatchCallback;
32import com.google.devtools.build.lib.cmdline.BatchCallback.SafeBatchCallback;
Googler216ea782024-10-15 04:08:21 -070033import com.google.devtools.build.lib.cmdline.IgnoredSubdirectories;
Lukacs Berki6e91eb92015-09-21 09:12:37 +000034import com.google.devtools.build.lib.cmdline.Label;
Kristina Chodorow73fa2032015-08-28 17:57:46 +000035import com.google.devtools.build.lib.cmdline.PackageIdentifier;
janakrbe525302021-11-16 14:45:58 -080036import com.google.devtools.build.lib.cmdline.QueryExceptionMarkerInterface;
Kristina Chodorowec5c07a2016-01-25 17:12:29 +000037import com.google.devtools.build.lib.cmdline.RepositoryName;
Mark Schallerb889cf32015-03-17 20:55:30 +000038import com.google.devtools.build.lib.cmdline.ResolvedTargets;
39import com.google.devtools.build.lib.cmdline.TargetParsingException;
40import com.google.devtools.build.lib.cmdline.TargetPatternResolver;
Nathan Harmata41b54172016-11-10 18:54:09 +000041import com.google.devtools.build.lib.concurrent.MultisetSemaphore;
Eric Fellheimer6f8b7ce2016-01-29 00:15:44 +000042import com.google.devtools.build.lib.concurrent.ThreadSafety.ThreadCompatible;
Mark Schallerb889cf32015-03-17 20:55:30 +000043import com.google.devtools.build.lib.events.Event;
Klaus Aehlig777b30d2017-02-24 16:30:15 +000044import com.google.devtools.build.lib.events.ExtendedEventHandler;
janakrb8bc2842021-12-08 12:48:02 -080045import com.google.devtools.build.lib.io.InconsistentFilesystemException;
46import com.google.devtools.build.lib.io.ProcessPackageDirectoryException;
Mark Schallerb889cf32015-03-17 20:55:30 +000047import com.google.devtools.build.lib.packages.NoSuchPackageException;
48import com.google.devtools.build.lib.packages.NoSuchThingException;
49import com.google.devtools.build.lib.packages.Package;
Mark Schallerb889cf32015-03-17 20:55:30 +000050import com.google.devtools.build.lib.packages.Target;
51import com.google.devtools.build.lib.pkgcache.FilteringPolicies;
52import com.google.devtools.build.lib.pkgcache.FilteringPolicy;
Mark Schallerb889cf32015-03-17 20:55:30 +000053import com.google.devtools.build.lib.pkgcache.RecursivePackageProvider;
54import com.google.devtools.build.lib.pkgcache.TargetPatternResolverUtil;
juliexxiade072462021-01-07 07:53:28 -080055import com.google.devtools.build.lib.query2.engine.QueryException;
Googler35b92d02020-08-03 07:42:11 -070056import com.google.devtools.build.lib.server.FailureDetails.TargetPatterns;
Mark Schallerb889cf32015-03-17 20:55:30 +000057import com.google.devtools.build.lib.vfs.PathFragment;
Janak Ramakrishnan5b5f22a2016-01-07 17:07:29 +000058import java.util.ArrayList;
ulfjack53a0ff12019-05-21 07:08:40 -070059import java.util.Collection;
Janak Ramakrishnan5b5f22a2016-01-07 17:07:29 +000060import java.util.List;
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +000061import java.util.Map;
Googler2a5a0042024-10-16 07:11:44 -070062import java.util.Optional;
adgar0da823c2019-07-29 07:48:23 -070063import java.util.concurrent.Callable;
Mark Schallerd9d390a2016-06-21 22:01:28 +000064import java.util.concurrent.ExecutionException;
janakrb8bc2842021-12-08 12:48:02 -080065import java.util.concurrent.Future;
Googler2a5a0042024-10-16 07:11:44 -070066import java.util.concurrent.Semaphore;
Googler5cc598c2022-07-06 03:29:45 -070067import javax.annotation.Nullable;
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +000068
janakrb8bc2842021-12-08 12:48:02 -080069/** A {@link TargetPatternResolver} backed by a {@link RecursivePackageProvider}. */
Eric Fellheimer6f8b7ce2016-01-29 00:15:44 +000070@ThreadCompatible
janakrb8bc2842021-12-08 12:48:02 -080071public final class RecursivePackageProviderBackedTargetPatternResolver
Nathan Harmata7a5a2362017-03-08 22:42:01 +000072 extends TargetPatternResolver<Target> {
Mark Schallerb889cf32015-03-17 20:55:30 +000073
Janak Ramakrishnan5b5f22a2016-01-07 17:07:29 +000074 // TODO(janakr): Move this to a more generic place and unify with SkyQueryEnvironment's value?
adgar566b7382019-08-23 08:49:45 -070075 static final int MAX_PACKAGES_BULK_GET = 1000;
Janak Ramakrishnan5b5f22a2016-01-07 17:07:29 +000076
Googler77ba65e2017-06-26 19:55:09 +020077 protected final FilteringPolicy policy;
Mark Schallerb889cf32015-03-17 20:55:30 +000078 private final RecursivePackageProvider recursivePackageProvider;
Klaus Aehlig777b30d2017-02-24 16:30:15 +000079 private final ExtendedEventHandler eventHandler;
Nathan Harmata41b54172016-11-10 18:54:09 +000080 private final MultisetSemaphore<PackageIdentifier> packageSemaphore;
Googler2a5a0042024-10-16 07:11:44 -070081
82 @Nullable private final Semaphore getTargetsTaskSemaphore;
nharmatafbdd5932021-05-20 12:07:09 -070083 private final PackageIdentifierBatchingCallback.Factory packageIdentifierBatchingCallbackFactory;
Mark Schallerb889cf32015-03-17 20:55:30 +000084
85 public RecursivePackageProviderBackedTargetPatternResolver(
Mark Schaller8ca91312015-06-22 22:04:02 +000086 RecursivePackageProvider recursivePackageProvider,
Klaus Aehlig777b30d2017-02-24 16:30:15 +000087 ExtendedEventHandler eventHandler,
Eric Fellheimer6f8b7ce2016-01-29 00:15:44 +000088 FilteringPolicy policy,
nharmatafbdd5932021-05-20 12:07:09 -070089 MultisetSemaphore<PackageIdentifier> packageSemaphore,
Googler2a5a0042024-10-16 07:11:44 -070090 Optional<Integer> maxConcurrentGetTargetsTasks,
nharmatafbdd5932021-05-20 12:07:09 -070091 PackageIdentifierBatchingCallback.Factory packageIdentifierBatchingCallbackFactory) {
Mark Schallerb889cf32015-03-17 20:55:30 +000092 this.recursivePackageProvider = recursivePackageProvider;
93 this.eventHandler = eventHandler;
94 this.policy = policy;
Nathan Harmata41b54172016-11-10 18:54:09 +000095 this.packageSemaphore = packageSemaphore;
Googler2a5a0042024-10-16 07:11:44 -070096 this.getTargetsTaskSemaphore =
97 maxConcurrentGetTargetsTasks.isPresent()
98 ? new Semaphore(maxConcurrentGetTargetsTasks.get())
99 : null;
nharmatafbdd5932021-05-20 12:07:09 -0700100 this.packageIdentifierBatchingCallbackFactory = packageIdentifierBatchingCallbackFactory;
Mark Schallerb889cf32015-03-17 20:55:30 +0000101 }
102
103 @Override
104 public void warn(String msg) {
105 eventHandler.handle(Event.warn(msg));
106 }
107
108 /**
109 * Gets a {@link Package} from the {@link RecursivePackageProvider}. May return a {@link Package}
110 * that has errors.
111 */
112 private Package getPackage(PackageIdentifier pkgIdentifier)
113 throws NoSuchPackageException, InterruptedException {
Janak Ramakrishnan0a4c6e42015-09-17 00:37:58 +0000114 return recursivePackageProvider.getPackage(eventHandler, pkgIdentifier);
Mark Schallerb889cf32015-03-17 20:55:30 +0000115 }
116
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000117 private Map<PackageIdentifier, Package> bulkGetPackages(Iterable<PackageIdentifier> pkgIds)
janakrb8bc2842021-12-08 12:48:02 -0800118 throws NoSuchPackageException, InterruptedException {
Mark Schallerfb2d38b2017-03-10 23:01:45 +0000119 return recursivePackageProvider.bulkGetPackages(pkgIds);
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000120 }
121
Mark Schallerb889cf32015-03-17 20:55:30 +0000122 @Override
Googler5cc598c2022-07-06 03:29:45 -0700123 @Nullable
janakrb8bc2842021-12-08 12:48:02 -0800124 public Target getTargetOrNull(Label label)
125 throws InterruptedException, InconsistentFilesystemException {
Mark Schallerb889cf32015-03-17 20:55:30 +0000126 try {
Lukacs Berki10e3b2b2015-09-22 07:58:20 +0000127 if (!isPackage(label.getPackageIdentifier())) {
Mark Schallerb889cf32015-03-17 20:55:30 +0000128 return null;
129 }
shreyax159a6112018-06-12 15:34:09 -0700130 return recursivePackageProvider.getTarget(eventHandler, label);
Lukacs Berki960dc272015-09-24 07:48:36 +0000131 } catch (NoSuchThingException e) {
Mark Schallerb889cf32015-03-17 20:55:30 +0000132 return null;
133 }
134 }
135
136 @Override
Lukacs Berki960dc272015-09-24 07:48:36 +0000137 public ResolvedTargets<Target> getExplicitTarget(Label label)
Mark Schallerb889cf32015-03-17 20:55:30 +0000138 throws TargetParsingException, InterruptedException {
Mark Schallerb889cf32015-03-17 20:55:30 +0000139 try {
140 Target target = recursivePackageProvider.getTarget(eventHandler, label);
141 return policy.shouldRetain(target, true)
shreyax159a6112018-06-12 15:34:09 -0700142 ? ResolvedTargets.of(target)
Googler54be05a2020-06-29 09:20:32 -0700143 : ResolvedTargets.empty();
Mark Schallerb889cf32015-03-17 20:55:30 +0000144 } catch (NoSuchThingException e) {
Googler35b92d02020-08-03 07:42:11 -0700145 throw new TargetParsingException(e.getMessage(), e, e.getDetailedExitCode());
Mark Schallerb889cf32015-03-17 20:55:30 +0000146 }
147 }
148
149 @Override
ulfjack53a0ff12019-05-21 07:08:40 -0700150 public Collection<Target> getTargetsInPackage(
Lukacs Berki10e3b2b2015-09-22 07:58:20 +0000151 String originalPattern, PackageIdentifier packageIdentifier, boolean rulesOnly)
Mark Schallerb889cf32015-03-17 20:55:30 +0000152 throws TargetParsingException, InterruptedException {
janakrb8bc2842021-12-08 12:48:02 -0800153 FilteringPolicy actualPolicy =
154 rulesOnly ? FilteringPolicies.and(FilteringPolicies.RULES_ONLY, policy) : policy;
Mark Schallerb889cf32015-03-17 20:55:30 +0000155 try {
Lukacs Berki10e3b2b2015-09-22 07:58:20 +0000156 Package pkg = getPackage(packageIdentifier);
Googler12c52a82023-10-23 10:16:20 -0700157 Package.maybeAddPackageContainsErrorsEventToHandler(pkg, eventHandler);
shreyax159a6112018-06-12 15:34:09 -0700158 return TargetPatternResolverUtil.resolvePackageTargets(pkg, actualPolicy);
Mark Schallerb889cf32015-03-17 20:55:30 +0000159 } catch (NoSuchThingException e) {
janakrb8bc2842021-12-08 12:48:02 -0800160 String message =
161 TargetPatternResolverUtil.getParsingErrorMessage(e.getMessage(), originalPattern);
Googler35b92d02020-08-03 07:42:11 -0700162 throw new TargetParsingException(message, e, e.getDetailedExitCode());
Mark Schallerb889cf32015-03-17 20:55:30 +0000163 }
164 }
165
ulfjack53a0ff12019-05-21 07:08:40 -0700166 private Map<PackageIdentifier, Collection<Target>> bulkGetTargetsInPackage(
167 String originalPattern, Iterable<PackageIdentifier> pkgIds, FilteringPolicy policy)
168 throws InterruptedException {
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000169 try {
170 Map<PackageIdentifier, Package> pkgs = bulkGetPackages(pkgIds);
Eric Fellheimerfb601432016-03-07 21:14:44 +0000171 if (pkgs.size() != Iterables.size(pkgIds)) {
janakrb8bc2842021-12-08 12:48:02 -0800172 throw new IllegalStateException(
173 "Bulk package retrieval missing results: "
174 + Sets.difference(ImmutableSet.copyOf(pkgIds), pkgs.keySet()));
Eric Fellheimerfb601432016-03-07 21:14:44 +0000175 }
ulfjack53a0ff12019-05-21 07:08:40 -0700176 ImmutableMap.Builder<PackageIdentifier, Collection<Target>> result = ImmutableMap.builder();
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000177 for (PackageIdentifier pkgId : pkgIds) {
178 Package pkg = pkgs.get(pkgId);
Googler12c52a82023-10-23 10:16:20 -0700179 Package.maybeAddPackageContainsErrorsEventToHandler(pkg, eventHandler);
janakrb8bc2842021-12-08 12:48:02 -0800180 result.put(pkgId, TargetPatternResolverUtil.resolvePackageTargets(pkg, policy));
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000181 }
Googler3cd5f842022-01-31 17:07:10 -0800182 return result.buildOrThrow();
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000183 } catch (NoSuchThingException e) {
janakrb8bc2842021-12-08 12:48:02 -0800184 String message =
185 TargetPatternResolverUtil.getParsingErrorMessage(e.getMessage(), originalPattern);
Eric Fellheimerfb601432016-03-07 21:14:44 +0000186 throw new IllegalStateException(
187 "Mismatch: Expected given pkgIds to correspond to valid Packages. " + message, e);
Eric Fellheimer7b8dbeb2015-12-30 15:21:43 +0000188 }
189 }
190
Mark Schallerb889cf32015-03-17 20:55:30 +0000191 @Override
janakrb8bc2842021-12-08 12:48:02 -0800192 public boolean isPackage(PackageIdentifier packageIdentifier)
193 throws InterruptedException, InconsistentFilesystemException {
Lukacs Berki10e3b2b2015-09-22 07:58:20 +0000194 return recursivePackageProvider.isPackage(eventHandler, packageIdentifier);
Mark Schallerb889cf32015-03-17 20:55:30 +0000195 }
196
197 @Override
198 public String getTargetKind(Target target) {
199 return target.getTargetKind();
200 }
201
202 @Override
janakrbe525302021-11-16 14:45:58 -0800203 public <E extends Exception & QueryExceptionMarkerInterface> void findTargetsBeneathDirectory(
Janak Ramakrishnan5b5f22a2016-01-07 17:07:29 +0000204 final RepositoryName repository,
Eric Fellheimer6f8b7ce2016-01-29 00:15:44 +0000205 final String originalPattern,
Janak Ramakrishnan5b5f22a2016-01-07 17:07:29 +0000206 String directory,
207 boolean rulesOnly,
Googler216ea782024-10-15 04:08:21 -0700208 IgnoredSubdirectories forbiddenSubdirectories,
Janak Ramakrishnan3d9441b2016-01-13 17:38:29 +0000209 ImmutableSet<PathFragment> excludedSubdirectories,
Nathan Harmata5bd26b22016-11-14 19:55:50 +0000210 BatchCallback<Target, E> callback,
211 Class<E> exceptionClass)
janakrb8bc2842021-12-08 12:48:02 -0800212 throws TargetParsingException, E, InterruptedException, ProcessPackageDirectoryException {
213 ListenableFuture<Void> future;
Nathan Harmata7a5a2362017-03-08 22:42:01 +0000214 try {
janakrb8bc2842021-12-08 12:48:02 -0800215 future =
216 findTargetsBeneathDirectoryAsyncImpl(
Googler54be05a2020-06-29 09:20:32 -0700217 repository,
218 originalPattern,
219 directory,
220 rulesOnly,
aiuto1469a752021-06-17 17:46:15 -0700221 forbiddenSubdirectories,
Googler54be05a2020-06-29 09:20:32 -0700222 excludedSubdirectories,
223 callback,
janakrb8bc2842021-12-08 12:48:02 -0800224 MoreExecutors.newDirectExecutorService());
225 } catch (QueryException e) {
Googler16b2be12024-03-06 10:04:22 -0800226 throwIfInstanceOf(e, exceptionClass);
janakrb8bc2842021-12-08 12:48:02 -0800227 throw new IllegalStateException(e);
228 } catch (NoSuchPackageException e) {
229 // Can happen during a Skyframe no-keep-going evaluation.
230 throw new TargetParsingException(
231 "error loading package under directory '" + directory + "': " + e.getMessage(),
232 e,
233 e.getDetailedExitCode());
234 }
235 if (!isSuccessful(future)) {
236 // Don't get the future if it finished successfully: all that will do is throw an
237 // interrupted exception if this thread was interrupted, but that's not helpful for a done
238 // future.
239 try {
240 future.get();
241 } catch (ExecutionException e) {
242 Throwables.propagateIfPossible(e.getCause(), InterruptedException.class, exceptionClass);
243 throw new IllegalStateException(e.getCause());
244 }
Nathan Harmata7a5a2362017-03-08 22:42:01 +0000245 }
246 }
247
248 @Override
janakrbe525302021-11-16 14:45:58 -0800249 public <E extends Exception & QueryExceptionMarkerInterface>
250 ListenableFuture<Void> findTargetsBeneathDirectoryAsync(
251 RepositoryName repository,
252 String originalPattern,
253 String directory,
254 boolean rulesOnly,
Googler216ea782024-10-15 04:08:21 -0700255 IgnoredSubdirectories forbiddenSubdirectories,
janakrbe525302021-11-16 14:45:58 -0800256 ImmutableSet<PathFragment> excludedSubdirectories,
257 BatchCallback<Target, E> callback,
258 Class<E> exceptionClass,
259 ListeningExecutorService executor) {
janakrb8bc2842021-12-08 12:48:02 -0800260 try {
261 return findTargetsBeneathDirectoryAsyncImpl(
262 repository,
263 originalPattern,
264 directory,
265 rulesOnly,
266 forbiddenSubdirectories,
267 excludedSubdirectories,
268 callback,
269 executor);
270 } catch (TargetParsingException e) {
271 return immediateFailedFuture(e);
272 } catch (InterruptedException e) {
273 return immediateCancelledFuture();
274 } catch (ProcessPackageDirectoryException | NoSuchPackageException e) {
275 throw new IllegalStateException(
276 "Async find targets beneath directory isn't called from within Skyframe: traversing "
277 + directory
278 + " for "
279 + originalPattern,
280 e);
281 } catch (QueryException e) {
282 if (exceptionClass.isInstance(e)) {
283 return immediateFailedFuture(e);
284 }
285 throw new IllegalStateException(e);
286 }
Nathan Harmata5bd26b22016-11-14 19:55:50 +0000287 }
288
janakrb8bc2842021-12-08 12:48:02 -0800289 /**
290 * The returned future may throw {@link QueryException} (if {@code E} is {@link QueryException})
291 * or {@link InterruptedException} on retrieval, but no other exceptions.
292 */
janakrbe525302021-11-16 14:45:58 -0800293 private <E extends Exception & QueryExceptionMarkerInterface>
294 ListenableFuture<Void> findTargetsBeneathDirectoryAsyncImpl(
295 RepositoryName repository,
296 String pattern,
297 String directory,
298 boolean rulesOnly,
Googler216ea782024-10-15 04:08:21 -0700299 IgnoredSubdirectories forbiddenSubdirectories,
janakrbe525302021-11-16 14:45:58 -0800300 ImmutableSet<PathFragment> excludedSubdirectories,
301 BatchCallback<Target, E> callback,
janakrb8bc2842021-12-08 12:48:02 -0800302 ListeningExecutorService executor)
Googler216ea782024-10-15 04:08:21 -0700303 throws TargetParsingException,
304 QueryException,
305 InterruptedException,
306 ProcessPackageDirectoryException,
307 NoSuchPackageException {
adgar0da823c2019-07-29 07:48:23 -0700308 FilteringPolicy actualPolicy =
309 rulesOnly ? FilteringPolicies.and(FilteringPolicies.RULES_ONLY, policy) : policy;
adgar566b7382019-08-23 08:49:45 -0700310
adgar0da823c2019-07-29 07:48:23 -0700311 ArrayList<ListenableFuture<Void>> futures = new ArrayList<>();
janakrbe525302021-11-16 14:45:58 -0800312 SafeBatchCallback<PackageIdentifier> getPackageTargetsCallback =
adgar0da823c2019-07-29 07:48:23 -0700313 (pkgIdBatch) ->
314 futures.add(
315 executor.submit(
316 new GetTargetsInPackagesTask<>(pkgIdBatch, pattern, actualPolicy, callback)));
adgar566b7382019-08-23 08:49:45 -0700317
janakrb8bc2842021-12-08 12:48:02 -0800318 PathFragment pathFragment = TargetPatternResolverUtil.getPathFragment(directory);
adgar566b7382019-08-23 08:49:45 -0700319 try (PackageIdentifierBatchingCallback batchingCallback =
nharmatafbdd5932021-05-20 12:07:09 -0700320 packageIdentifierBatchingCallbackFactory.create(
321 getPackageTargetsCallback, MAX_PACKAGES_BULK_GET)) {
adgar0da823c2019-07-29 07:48:23 -0700322 recursivePackageProvider.streamPackagesUnderDirectory(
adgar566b7382019-08-23 08:49:45 -0700323 batchingCallback,
adgar0da823c2019-07-29 07:48:23 -0700324 eventHandler,
325 repository,
326 pathFragment,
aiuto1469a752021-06-17 17:46:15 -0700327 forbiddenSubdirectories,
adgar0da823c2019-07-29 07:48:23 -0700328 excludedSubdirectories);
Nathan Harmata7a5a2362017-03-08 22:42:01 +0000329 }
adgar0da823c2019-07-29 07:48:23 -0700330 if (futures.isEmpty()) {
janakrb8bc2842021-12-08 12:48:02 -0800331 throw new TargetParsingException(
332 "no targets found beneath '" + pathFragment + "'", TargetPatterns.Code.TARGETS_MISSING);
shreyax91e0bae2018-11-06 15:42:13 -0800333 }
shreyax91e0bae2018-11-06 15:42:13 -0800334 return Futures.whenAllSucceed(futures).call(() -> null, directExecutor());
Mark Schallerb889cf32015-03-17 20:55:30 +0000335 }
Eric Fellheimer8c40daa2016-01-11 17:31:26 +0000336
adgar0da823c2019-07-29 07:48:23 -0700337 /**
338 * Task to get all matching targets in the given packages, filter them, and pass them to the
339 * target batch callback.
340 */
janakrbe525302021-11-16 14:45:58 -0800341 private class GetTargetsInPackagesTask<E extends Exception & QueryExceptionMarkerInterface>
342 implements Callable<Void> {
adgar0da823c2019-07-29 07:48:23 -0700343
344 private final Iterable<PackageIdentifier> packageIdentifiers;
345 private final String originalPattern;
346 private final FilteringPolicy actualPolicy;
Googler54be05a2020-06-29 09:20:32 -0700347 private final BatchCallback<Target, E> callback;
adgar0da823c2019-07-29 07:48:23 -0700348
349 GetTargetsInPackagesTask(
350 Iterable<PackageIdentifier> packageIdentifiers,
351 String originalPattern,
352 FilteringPolicy actualPolicy,
Googler54be05a2020-06-29 09:20:32 -0700353 BatchCallback<Target, E> callback) {
adgar0da823c2019-07-29 07:48:23 -0700354 this.packageIdentifiers = packageIdentifiers;
355 this.originalPattern = originalPattern;
356 this.actualPolicy = actualPolicy;
357 this.callback = callback;
358 }
359
Googler2a5a0042024-10-16 07:11:44 -0700360 private void acquireTaskLock() throws InterruptedException {
361 if (getTargetsTaskSemaphore != null) {
362 getTargetsTaskSemaphore.acquire();
363 }
364 }
365
366 private void releaseTaskLock() {
367 if (getTargetsTaskSemaphore != null) {
368 getTargetsTaskSemaphore.release();
369 }
370 }
371
adgar0da823c2019-07-29 07:48:23 -0700372 @Override
janakrb8bc2842021-12-08 12:48:02 -0800373 public Void call() throws E, InterruptedException {
adgar0da823c2019-07-29 07:48:23 -0700374 ImmutableSet<PackageIdentifier> pkgIdBatchSet = ImmutableSet.copyOf(packageIdentifiers);
Googler2a5a0042024-10-16 07:11:44 -0700375 acquireTaskLock();
adgar0da823c2019-07-29 07:48:23 -0700376 packageSemaphore.acquireAll(pkgIdBatchSet);
377 try {
378 Iterable<Collection<Target>> resolvedTargets =
379 RecursivePackageProviderBackedTargetPatternResolver.this
380 .bulkGetTargetsInPackage(originalPattern, packageIdentifiers, actualPolicy)
381 .values();
382 List<Target> filteredTargets = new ArrayList<>(calculateSize(resolvedTargets));
383 for (Collection<Target> targets : resolvedTargets) {
384 filteredTargets.addAll(targets);
385 }
nharmata2c3929c2021-07-19 11:09:52 -0700386 // TODO(b/121277360): Invoking the callback while holding onto the package
nharmata30498d82020-09-10 06:46:53 -0700387 // semaphore can lead to deadlocks.
388 //
389 // Also, if the semaphore has a small count, acquireAll can also lead to problems if we
390 // don't batch appropriately. Note: We default to an unbounded semaphore for SkyQuery.
391 //
392 // TODO(b/168142585): Make this code strictly correct in the situation where the semaphore
393 // is bounded.
adgar0da823c2019-07-29 07:48:23 -0700394 callback.process(filteredTargets);
395 } finally {
396 packageSemaphore.releaseAll(pkgIdBatchSet);
Googler2a5a0042024-10-16 07:11:44 -0700397 releaseTaskLock();
adgar0da823c2019-07-29 07:48:23 -0700398 }
399 return null;
400 }
401 }
402
ulfjack53a0ff12019-05-21 07:08:40 -0700403 private static <T> int calculateSize(Iterable<Collection<T>> resolvedTargets) {
Eric Fellheimer8c40daa2016-01-11 17:31:26 +0000404 int size = 0;
ulfjack53a0ff12019-05-21 07:08:40 -0700405 for (Collection<T> targets : resolvedTargets) {
406 size += targets.size();
Eric Fellheimer8c40daa2016-01-11 17:31:26 +0000407 }
408 return size;
409 }
Mark Schallerb889cf32015-03-17 20:55:30 +0000410
janakrb8bc2842021-12-08 12:48:02 -0800411 /** Inspired by not-yet-open-source futures code. */
412 private static boolean isSuccessful(Future<?> future) {
413 if (future.isDone() && !future.isCancelled()) {
414 try {
415 Uninterruptibles.getUninterruptibly(future);
416 return true;
417 } catch (ExecutionException | RuntimeException e) {
418 // Fall through.
419 }
420 }
421 return false;
422 }
423}