1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884
|
// Copyright 2019 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package cache
import (
"context"
"fmt"
"os"
"strconv"
"strings"
"sync"
"sync/atomic"
"golang.org/x/tools/gopls/internal/govulncheck"
"golang.org/x/tools/gopls/internal/lsp/source"
"golang.org/x/tools/gopls/internal/span"
"golang.org/x/tools/internal/bug"
"golang.org/x/tools/internal/event"
"golang.org/x/tools/internal/gocommand"
"golang.org/x/tools/internal/imports"
"golang.org/x/tools/internal/persistent"
"golang.org/x/tools/internal/xcontext"
)
type Session struct {
// Unique identifier for this session.
id string
// Immutable attributes shared across views.
cache *Cache // shared cache
gocmdRunner *gocommand.Runner // limits go command concurrency
optionsMu sync.Mutex
options *source.Options
viewMu sync.Mutex
views []*View
viewMap map[span.URI]*View // map of URI->best view
overlayMu sync.Mutex
overlays map[span.URI]*overlay
}
type overlay struct {
session *Session
uri span.URI
text []byte
hash source.Hash
version int32
kind source.FileKind
// saved is true if a file matches the state on disk,
// and therefore does not need to be part of the overlay sent to go/packages.
saved bool
}
func (o *overlay) Read() ([]byte, error) {
return o.text, nil
}
func (o *overlay) FileIdentity() source.FileIdentity {
return source.FileIdentity{
URI: o.uri,
Hash: o.hash,
}
}
func (o *overlay) VersionedFileIdentity() source.VersionedFileIdentity {
return source.VersionedFileIdentity{
URI: o.uri,
SessionID: o.session.id,
Version: o.version,
}
}
func (o *overlay) Kind() source.FileKind {
return o.kind
}
func (o *overlay) URI() span.URI {
return o.uri
}
func (o *overlay) Version() int32 {
return o.version
}
func (o *overlay) Session() string {
return o.session.id
}
func (o *overlay) Saved() bool {
return o.saved
}
// closedFile implements LSPFile for a file that the editor hasn't told us about.
type closedFile struct {
source.FileHandle
}
func (c *closedFile) VersionedFileIdentity() source.VersionedFileIdentity {
return source.VersionedFileIdentity{
URI: c.FileHandle.URI(),
SessionID: "",
Version: 0,
}
}
func (c *closedFile) Saved() bool {
return true
}
func (c *closedFile) Session() string {
return ""
}
func (c *closedFile) Version() int32 {
return 0
}
// ID returns the unique identifier for this session on this server.
func (s *Session) ID() string { return s.id }
func (s *Session) String() string { return s.id }
// Options returns a copy of the SessionOptions for this session.
func (s *Session) Options() *source.Options {
s.optionsMu.Lock()
defer s.optionsMu.Unlock()
return s.options
}
// SetOptions sets the options of this session to new values.
func (s *Session) SetOptions(options *source.Options) {
s.optionsMu.Lock()
defer s.optionsMu.Unlock()
s.options = options
}
// Shutdown the session and all views it has created.
func (s *Session) Shutdown(ctx context.Context) {
var views []*View
s.viewMu.Lock()
views = append(views, s.views...)
s.views = nil
s.viewMap = nil
s.viewMu.Unlock()
for _, view := range views {
view.shutdown()
}
event.Log(ctx, "Shutdown session", KeyShutdownSession.Of(s))
}
// Cache returns the cache that created this session, for debugging only.
func (s *Session) Cache() *Cache {
return s.cache
}
// NewView creates a new View, returning it and its first snapshot. If a
// non-empty tempWorkspace directory is provided, the View will record a copy
// of its gopls workspace module in that directory, so that client tooling
// can execute in the same main module. On success it also returns a release
// function that must be called when the Snapshot is no longer needed.
func (s *Session) NewView(ctx context.Context, name string, folder span.URI, options *source.Options) (*View, source.Snapshot, func(), error) {
s.viewMu.Lock()
defer s.viewMu.Unlock()
for _, view := range s.views {
if span.SameExistingFile(view.folder, folder) {
return nil, nil, nil, source.ErrViewExists
}
}
view, snapshot, release, err := s.createView(ctx, name, folder, options, 0)
if err != nil {
return nil, nil, nil, err
}
s.views = append(s.views, view)
// we always need to drop the view map
s.viewMap = make(map[span.URI]*View)
return view, snapshot, release, nil
}
func (s *Session) createView(ctx context.Context, name string, folder span.URI, options *source.Options, seqID uint64) (*View, *snapshot, func(), error) {
index := atomic.AddInt64(&viewIndex, 1)
// Get immutable workspace configuration.
//
// TODO(rfindley): this info isn't actually immutable. For example, GOWORK
// could be changed, or a user's environment could be modified.
// We need a mechanism to invalidate it.
wsInfo, err := s.getWorkspaceInformation(ctx, folder, options)
if err != nil {
return nil, nil, func() {}, err
}
root := folder
// filterFunc is the path filter function for this workspace folder. Notably,
// it is relative to folder (which is specified by the user), not root.
filterFunc := pathExcludedByFilterFunc(folder.Filename(), wsInfo.gomodcache, options)
rootSrc, err := findWorkspaceModuleSource(ctx, root, s, filterFunc, options.ExperimentalWorkspaceModule)
if err != nil {
return nil, nil, func() {}, err
}
if options.ExpandWorkspaceToModule && rootSrc != "" {
root = span.Dir(rootSrc)
}
explicitGowork := os.Getenv("GOWORK")
if v, ok := options.Env["GOWORK"]; ok {
explicitGowork = v
}
goworkURI := span.URIFromPath(explicitGowork)
// Build the gopls workspace, collecting active modules in the view.
workspace, err := newWorkspace(ctx, root, goworkURI, s, filterFunc, wsInfo.effectiveGO111MODULE() == off, options.ExperimentalWorkspaceModule)
if err != nil {
return nil, nil, func() {}, err
}
// We want a true background context and not a detached context here
// the spans need to be unrelated and no tag values should pollute it.
baseCtx := event.Detach(xcontext.Detach(ctx))
backgroundCtx, cancel := context.WithCancel(baseCtx)
v := &View{
id: strconv.FormatInt(index, 10),
cache: s.cache,
gocmdRunner: s.gocmdRunner,
initialWorkspaceLoad: make(chan struct{}),
initializationSema: make(chan struct{}, 1),
options: options,
baseCtx: baseCtx,
name: name,
folder: folder,
moduleUpgrades: map[span.URI]map[string]string{},
vulns: map[span.URI]*govulncheck.Result{},
filesByURI: make(map[span.URI]span.URI),
filesByBase: make(map[string][]canonicalURI),
rootURI: root,
rootSrc: rootSrc,
explicitGowork: goworkURI,
workspaceInformation: *wsInfo,
}
v.importsState = &importsState{
ctx: backgroundCtx,
processEnv: &imports.ProcessEnv{
GocmdRunner: s.gocmdRunner,
SkipPathInScan: func(dir string) bool {
prefix := strings.TrimSuffix(string(v.folder), "/") + "/"
uri := strings.TrimSuffix(string(span.URIFromPath(dir)), "/")
if !strings.HasPrefix(uri+"/", prefix) {
return false
}
filterer := source.NewFilterer(options.DirectoryFilters)
rel := strings.TrimPrefix(uri, prefix)
disallow := filterer.Disallow(rel)
return disallow
},
},
}
v.snapshot = &snapshot{
sequenceID: seqID,
globalID: nextSnapshotID(),
view: v,
backgroundCtx: backgroundCtx,
cancel: cancel,
store: s.cache.store,
packages: persistent.NewMap(packageKeyLessInterface),
meta: &metadataGraph{},
files: newFilesMap(),
isActivePackageCache: newIsActivePackageCacheMap(),
parsedGoFiles: persistent.NewMap(parseKeyLessInterface),
parseKeysByURI: newParseKeysByURIMap(),
symbolizeHandles: persistent.NewMap(uriLessInterface),
analyses: persistent.NewMap(analysisKeyLessInterface),
workspacePackages: make(map[PackageID]PackagePath),
unloadableFiles: make(map[span.URI]struct{}),
parseModHandles: persistent.NewMap(uriLessInterface),
parseWorkHandles: persistent.NewMap(uriLessInterface),
modTidyHandles: persistent.NewMap(uriLessInterface),
modVulnHandles: persistent.NewMap(uriLessInterface),
modWhyHandles: persistent.NewMap(uriLessInterface),
knownSubdirs: newKnownDirsSet(),
workspace: workspace,
}
// Save one reference in the view.
v.releaseSnapshot = v.snapshot.Acquire()
// Record the environment of the newly created view in the log.
event.Log(ctx, viewEnv(v))
// Initialize the view without blocking.
initCtx, initCancel := context.WithCancel(xcontext.Detach(ctx))
v.initCancelFirstAttempt = initCancel
snapshot := v.snapshot
// Pass a second reference to the background goroutine.
bgRelease := snapshot.Acquire()
go func() {
defer bgRelease()
snapshot.initialize(initCtx, true)
}()
// Return a third reference to the caller.
return v, snapshot, snapshot.Acquire(), nil
}
// View returns a view with a matching name, if the session has one.
func (s *Session) View(name string) *View {
s.viewMu.Lock()
defer s.viewMu.Unlock()
for _, view := range s.views {
if view.Name() == name {
return view
}
}
return nil
}
// ViewOf returns a view corresponding to the given URI.
// If the file is not already associated with a view, pick one using some heuristics.
func (s *Session) ViewOf(uri span.URI) (*View, error) {
s.viewMu.Lock()
defer s.viewMu.Unlock()
return s.viewOfLocked(uri)
}
// Precondition: caller holds s.viewMu lock.
func (s *Session) viewOfLocked(uri span.URI) (*View, error) {
// Check if we already know this file.
if v, found := s.viewMap[uri]; found {
return v, nil
}
// Pick the best view for this file and memoize the result.
if len(s.views) == 0 {
return nil, fmt.Errorf("no views in session")
}
s.viewMap[uri] = bestViewForURI(uri, s.views)
return s.viewMap[uri], nil
}
func (s *Session) Views() []*View {
s.viewMu.Lock()
defer s.viewMu.Unlock()
result := make([]*View, len(s.views))
copy(result, s.views)
return result
}
// bestViewForURI returns the most closely matching view for the given URI
// out of the given set of views.
func bestViewForURI(uri span.URI, views []*View) *View {
// we need to find the best view for this file
var longest *View
for _, view := range views {
if longest != nil && len(longest.Folder()) > len(view.Folder()) {
continue
}
// TODO(rfindley): this should consider the workspace layout (i.e.
// go.work).
if view.contains(uri) {
longest = view
}
}
if longest != nil {
return longest
}
// Try our best to return a view that knows the file.
for _, view := range views {
if view.knownFile(uri) {
return view
}
}
// TODO: are there any more heuristics we can use?
return views[0]
}
// RemoveView removes the view v from the session
func (s *Session) RemoveView(view *View) {
s.viewMu.Lock()
defer s.viewMu.Unlock()
i := s.dropView(view)
if i == -1 { // error reported elsewhere
return
}
// delete this view... we don't care about order but we do want to make
// sure we can garbage collect the view
s.views = removeElement(s.views, i)
}
// updateView recreates the view with the given options.
//
// If the resulting error is non-nil, the view may or may not have already been
// dropped from the session.
func (s *Session) updateView(ctx context.Context, view *View, options *source.Options) (*View, error) {
s.viewMu.Lock()
defer s.viewMu.Unlock()
return s.updateViewLocked(ctx, view, options)
}
func (s *Session) updateViewLocked(ctx context.Context, view *View, options *source.Options) (*View, error) {
// Preserve the snapshot ID if we are recreating the view.
view.snapshotMu.Lock()
if view.snapshot == nil {
view.snapshotMu.Unlock()
panic("updateView called after View was already shut down")
}
seqID := view.snapshot.sequenceID // Preserve sequence IDs when updating a view in place.
view.snapshotMu.Unlock()
i := s.dropView(view)
if i == -1 {
return nil, fmt.Errorf("view %q not found", view.id)
}
v, _, release, err := s.createView(ctx, view.name, view.folder, options, seqID)
release()
if err != nil {
// we have dropped the old view, but could not create the new one
// this should not happen and is very bad, but we still need to clean
// up the view array if it happens
s.views = removeElement(s.views, i)
return nil, err
}
// substitute the new view into the array where the old view was
s.views[i] = v
return v, nil
}
// removeElement removes the ith element from the slice replacing it with the last element.
// TODO(adonovan): generics, someday.
func removeElement(slice []*View, index int) []*View {
last := len(slice) - 1
slice[index] = slice[last]
slice[last] = nil // aid GC
return slice[:last]
}
// dropView removes v from the set of views for the receiver s and calls
// v.shutdown, returning the index of v in s.views (if found), or -1 if v was
// not found. s.viewMu must be held while calling this function.
func (s *Session) dropView(v *View) int {
// we always need to drop the view map
s.viewMap = make(map[span.URI]*View)
for i := range s.views {
if v == s.views[i] {
// we found the view, drop it and return the index it was found at
s.views[i] = nil
v.shutdown()
return i
}
}
// TODO(rfindley): it looks wrong that we don't shutdown v in this codepath.
// We should never get here.
bug.Reportf("tried to drop nonexistent view %q", v.id)
return -1
}
func (s *Session) ModifyFiles(ctx context.Context, changes []source.FileModification) error {
_, release, err := s.DidModifyFiles(ctx, changes)
release()
return err
}
// TODO(rfindley): fileChange seems redundant with source.FileModification.
// De-dupe into a common representation for changes.
type fileChange struct {
content []byte
exists bool
fileHandle source.VersionedFileHandle
// isUnchanged indicates whether the file action is one that does not
// change the actual contents of the file. Opens and closes should not
// be treated like other changes, since the file content doesn't change.
isUnchanged bool
}
// DidModifyFiles reports a file modification to the session. It returns
// the new snapshots after the modifications have been applied, paired with
// the affected file URIs for those snapshots.
// On success, it returns a release function that
// must be called when the snapshots are no longer needed.
//
// TODO(rfindley): what happens if this function fails? It must leave us in a
// broken state, which we should surface to the user, probably as a request to
// restart gopls.
func (s *Session) DidModifyFiles(ctx context.Context, changes []source.FileModification) (map[source.Snapshot][]span.URI, func(), error) {
s.viewMu.Lock()
defer s.viewMu.Unlock()
// Update overlays.
//
// TODO(rfindley): I think we do this while holding viewMu to prevent views
// from seeing the updated file content before they have processed
// invalidations, which could lead to a partial view of the changes (i.e.
// spurious diagnostics). However, any such view would immediately be
// invalidated here, so it is possible that we could update overlays before
// acquiring viewMu.
overlays, err := s.updateOverlays(ctx, changes)
if err != nil {
return nil, nil, err
}
// Re-create views whose root may have changed.
//
// checkRoots controls whether to re-evaluate view definitions when
// collecting views below. Any change to a go.mod or go.work file may have
// affected the definition of the view.
checkRoots := false
for _, c := range changes {
if isGoMod(c.URI) || isGoWork(c.URI) {
checkRoots = true
break
}
}
if checkRoots {
for _, view := range s.views {
// Check whether the view must be recreated. This logic looks hacky,
// as it uses the existing view gomodcache and options to re-evaluate
// the workspace source, then expects view creation to compute the same
// root source after first re-evaluating gomodcache and options.
//
// Well, it *is* a bit hacky, but in practice we will get the same
// gomodcache and options, as any environment change affecting these
// should have already invalidated the view (c.f. minorOptionsChange).
//
// TODO(rfindley): clean this up.
filterFunc := pathExcludedByFilterFunc(view.folder.Filename(), view.gomodcache, view.Options())
src, err := findWorkspaceModuleSource(ctx, view.folder, s, filterFunc, view.Options().ExperimentalWorkspaceModule)
if err != nil {
return nil, nil, err
}
if src != view.rootSrc {
_, err := s.updateViewLocked(ctx, view, view.Options())
if err != nil {
// Catastrophic failure, equivalent to a failure of session
// initialization and therefore should almost never happen. One
// scenario where this failure mode could occur is if some file
// permissions have changed preventing us from reading go.mod
// files.
//
// The view may or may not still exist. The best we can do is log
// and move on.
//
// TODO(rfindley): consider surfacing this error more loudly. We
// could report a bug, but it's not really a bug.
event.Error(ctx, "recreating view", err)
}
}
}
}
// Collect information about views affected by these changes.
views := make(map[*View]map[span.URI]*fileChange)
affectedViews := map[span.URI][]*View{}
// forceReloadMetadata records whether any change is the magic
// source.InvalidateMetadata action.
forceReloadMetadata := false
for _, c := range changes {
if c.Action == source.InvalidateMetadata {
forceReloadMetadata = true
}
// Build the list of affected views.
var changedViews []*View
for _, view := range s.views {
// Don't propagate changes that are outside of the view's scope
// or knowledge.
if !view.relevantChange(c) {
continue
}
changedViews = append(changedViews, view)
}
// If the change is not relevant to any view, but the change is
// happening in the editor, assign it the most closely matching view.
if len(changedViews) == 0 {
if c.OnDisk {
continue
}
bestView, err := s.viewOfLocked(c.URI)
if err != nil {
return nil, nil, err
}
changedViews = append(changedViews, bestView)
}
affectedViews[c.URI] = changedViews
isUnchanged := c.Action == source.Open || c.Action == source.Close
// Apply the changes to all affected views.
for _, view := range changedViews {
// Make sure that the file is added to the view's knownFiles set.
view.canonicalURI(c.URI, true) // ignore result
if _, ok := views[view]; !ok {
views[view] = make(map[span.URI]*fileChange)
}
if fh, ok := overlays[c.URI]; ok {
views[view][c.URI] = &fileChange{
content: fh.text,
exists: true,
fileHandle: fh,
isUnchanged: isUnchanged,
}
} else {
fsFile, err := s.cache.getFile(ctx, c.URI)
if err != nil {
return nil, nil, err
}
content, err := fsFile.Read()
fh := &closedFile{fsFile}
views[view][c.URI] = &fileChange{
content: content,
exists: err == nil,
fileHandle: fh,
isUnchanged: isUnchanged,
}
}
}
}
var releases []func()
viewToSnapshot := map[*View]*snapshot{}
for view, changed := range views {
snapshot, release := view.invalidateContent(ctx, changed, forceReloadMetadata)
releases = append(releases, release)
viewToSnapshot[view] = snapshot
}
// The release function is called when the
// returned URIs no longer need to be valid.
release := func() {
for _, release := range releases {
release()
}
}
// We only want to diagnose each changed file once, in the view to which
// it "most" belongs. We do this by picking the best view for each URI,
// and then aggregating the set of snapshots and their URIs (to avoid
// diagnosing the same snapshot multiple times).
snapshotURIs := map[source.Snapshot][]span.URI{}
for _, mod := range changes {
viewSlice, ok := affectedViews[mod.URI]
if !ok || len(viewSlice) == 0 {
continue
}
view := bestViewForURI(mod.URI, viewSlice)
snapshot, ok := viewToSnapshot[view]
if !ok {
panic(fmt.Sprintf("no snapshot for view %s", view.Folder()))
}
snapshotURIs[snapshot] = append(snapshotURIs[snapshot], mod.URI)
}
return snapshotURIs, release, nil
}
// ExpandModificationsToDirectories returns the set of changes with the
// directory changes removed and expanded to include all of the files in
// the directory.
func (s *Session) ExpandModificationsToDirectories(ctx context.Context, changes []source.FileModification) []source.FileModification {
var snapshots []*snapshot
s.viewMu.Lock()
for _, v := range s.views {
snapshot, release := v.getSnapshot()
defer release()
snapshots = append(snapshots, snapshot)
}
s.viewMu.Unlock()
knownDirs := knownDirectories(ctx, snapshots)
defer knownDirs.Destroy()
var result []source.FileModification
for _, c := range changes {
if !knownDirs.Contains(c.URI) {
result = append(result, c)
continue
}
affectedFiles := knownFilesInDir(ctx, snapshots, c.URI)
var fileChanges []source.FileModification
for uri := range affectedFiles {
fileChanges = append(fileChanges, source.FileModification{
URI: uri,
Action: c.Action,
LanguageID: "",
OnDisk: c.OnDisk,
// changes to directories cannot include text or versions
})
}
result = append(result, fileChanges...)
}
return result
}
// knownDirectories returns all of the directories known to the given
// snapshots, including workspace directories and their subdirectories.
// It is responsibility of the caller to destroy the returned set.
func knownDirectories(ctx context.Context, snapshots []*snapshot) knownDirsSet {
result := newKnownDirsSet()
for _, snapshot := range snapshots {
dirs := snapshot.workspace.dirs(ctx, snapshot)
for _, dir := range dirs {
result.Insert(dir)
}
knownSubdirs := snapshot.getKnownSubdirs(dirs)
result.SetAll(knownSubdirs)
knownSubdirs.Destroy()
}
return result
}
// knownFilesInDir returns the files known to the snapshots in the session.
// It does not respect symlinks.
func knownFilesInDir(ctx context.Context, snapshots []*snapshot, dir span.URI) map[span.URI]struct{} {
files := map[span.URI]struct{}{}
for _, snapshot := range snapshots {
for _, uri := range snapshot.knownFilesInDir(ctx, dir) {
files[uri] = struct{}{}
}
}
return files
}
// Precondition: caller holds s.viewMu lock.
func (s *Session) updateOverlays(ctx context.Context, changes []source.FileModification) (map[span.URI]*overlay, error) {
s.overlayMu.Lock()
defer s.overlayMu.Unlock()
for _, c := range changes {
// Don't update overlays for metadata invalidations.
if c.Action == source.InvalidateMetadata {
continue
}
o, ok := s.overlays[c.URI]
// If the file is not opened in an overlay and the change is on disk,
// there's no need to update an overlay. If there is an overlay, we
// may need to update the overlay's saved value.
if !ok && c.OnDisk {
continue
}
// Determine the file kind on open, otherwise, assume it has been cached.
var kind source.FileKind
switch c.Action {
case source.Open:
kind = source.FileKindForLang(c.LanguageID)
default:
if !ok {
return nil, fmt.Errorf("updateOverlays: modifying unopened overlay %v", c.URI)
}
kind = o.kind
}
// Closing a file just deletes its overlay.
if c.Action == source.Close {
delete(s.overlays, c.URI)
continue
}
// If the file is on disk, check if its content is the same as in the
// overlay. Saves and on-disk file changes don't come with the file's
// content.
text := c.Text
if text == nil && (c.Action == source.Save || c.OnDisk) {
if !ok {
return nil, fmt.Errorf("no known content for overlay for %s", c.Action)
}
text = o.text
}
// On-disk changes don't come with versions.
version := c.Version
if c.OnDisk || c.Action == source.Save {
version = o.version
}
hash := source.HashOf(text)
var sameContentOnDisk bool
switch c.Action {
case source.Delete:
// Do nothing. sameContentOnDisk should be false.
case source.Save:
// Make sure the version and content (if present) is the same.
if false && o.version != version { // Client no longer sends the version
return nil, fmt.Errorf("updateOverlays: saving %s at version %v, currently at %v", c.URI, c.Version, o.version)
}
if c.Text != nil && o.hash != hash {
return nil, fmt.Errorf("updateOverlays: overlay %s changed on save", c.URI)
}
sameContentOnDisk = true
default:
fh, err := s.cache.getFile(ctx, c.URI)
if err != nil {
return nil, err
}
_, readErr := fh.Read()
sameContentOnDisk = (readErr == nil && fh.FileIdentity().Hash == hash)
}
o = &overlay{
session: s,
uri: c.URI,
version: version,
text: text,
kind: kind,
hash: hash,
saved: sameContentOnDisk,
}
// When opening files, ensure that we actually have a well-defined view and file kind.
if c.Action == source.Open {
view, err := s.viewOfLocked(o.uri)
if err != nil {
return nil, fmt.Errorf("updateOverlays: finding view for %s: %v", o.uri, err)
}
if kind := view.FileKind(o); kind == source.UnknownKind {
return nil, fmt.Errorf("updateOverlays: unknown file kind for %s", o.uri)
}
}
s.overlays[c.URI] = o
}
// Get the overlays for each change while the session's overlay map is
// locked.
overlays := make(map[span.URI]*overlay)
for _, c := range changes {
if o, ok := s.overlays[c.URI]; ok {
overlays[c.URI] = o
}
}
return overlays, nil
}
// GetFile returns a handle for the specified file.
func (s *Session) GetFile(ctx context.Context, uri span.URI) (source.FileHandle, error) {
if overlay := s.readOverlay(uri); overlay != nil {
return overlay, nil
}
// Fall back to the cache-level file system.
return s.cache.getFile(ctx, uri)
}
func (s *Session) readOverlay(uri span.URI) *overlay {
s.overlayMu.Lock()
defer s.overlayMu.Unlock()
if overlay, ok := s.overlays[uri]; ok {
return overlay
}
return nil
}
// Overlays returns a slice of file overlays for the session.
func (s *Session) Overlays() []source.Overlay {
s.overlayMu.Lock()
defer s.overlayMu.Unlock()
overlays := make([]source.Overlay, 0, len(s.overlays))
for _, overlay := range s.overlays {
overlays = append(overlays, overlay)
}
return overlays
}
// FileWatchingGlobPatterns returns glob patterns to watch every directory
// known by the view. For views within a module, this is the module root,
// any directory in the module root, and any replace targets.
func (s *Session) FileWatchingGlobPatterns(ctx context.Context) map[string]struct{} {
s.viewMu.Lock()
defer s.viewMu.Unlock()
patterns := map[string]struct{}{}
for _, view := range s.views {
snapshot, release := view.getSnapshot()
for k, v := range snapshot.fileWatchingGlobPatterns(ctx) {
patterns[k] = v
}
release()
}
return patterns
}
|