refactor(tvix/castore): move *Node and Directory to crate root

*Node and Directory are types of the tvix-castore model, not the tvix
DirectoryService model. A DirectoryService only happens to send
Directories.

Move types into individual files in a nodes/ subdirectory, as it's
gotten too cluttered in a single file, and (re-)export all types from
the crate root.

This has the effect that we now cannot poke at private fields directly
from other files inside `crate::directoryservice` (as it's not all in
the same file anymore), but that's a good thing, it now forces us to go
through the proper accessors.

For the same reasons, we currently also need to introduce the `rename`
functions on each *Node directly.

A followup is gonna move the names out of the individual enum kinds, so
we can better represent "unnamed nodes".

Change-Id: Icdb34dcfe454c41c94f2396e8e99973d27db8418
Reviewed-on: https://cl.tvl.fyi/c/depot/+/12199
Reviewed-by: yuka <yuka@yuka.dev>
Autosubmit: flokli <flokli@flokli.de>
Tested-by: BuildkiteCI
This commit is contained in:
Florian Klink 2024-08-13 20:04:58 +03:00 committed by clbot
parent 2f4185ff1a
commit c7845f3c88
42 changed files with 620 additions and 622 deletions

View file

@ -2,8 +2,9 @@ use std::path::Path;
use tracing::{debug, instrument};
use tvix_castore::{
blobservice::BlobService,
directoryservice::{DirectoryService, NamedNode, Node},
directoryservice::DirectoryService,
import::fs::ingest_path,
{NamedNode, Node},
};
use nix_compat::{

View file

@ -7,12 +7,12 @@ use tokio::{
};
use tvix_castore::{
blobservice::BlobService,
directoryservice::{DirectoryService, NamedNode, Node},
directoryservice::DirectoryService,
import::{
blobs::{self, ConcurrentBlobUploader},
ingest_entries, IngestionEntry, IngestionError,
},
PathBuf,
PathBuf, {NamedNode, Node},
};
/// Ingests the contents from a [AsyncRead] providing NAR into the tvix store,
@ -171,13 +171,12 @@ mod test {
use rstest::*;
use tokio_stream::StreamExt;
use tvix_castore::blobservice::BlobService;
use tvix_castore::directoryservice::{
Directory, DirectoryNode, DirectoryService, FileNode, Node, SymlinkNode,
};
use tvix_castore::directoryservice::DirectoryService;
use tvix_castore::fixtures::{
DIRECTORY_COMPLICATED, DIRECTORY_WITH_KEEP, EMPTY_BLOB_DIGEST, HELLOWORLD_BLOB_CONTENTS,
HELLOWORLD_BLOB_DIGEST,
};
use tvix_castore::{Directory, DirectoryNode, FileNode, Node, SymlinkNode};
use crate::tests::fixtures::{
blob_service, directory_service, NAR_CONTENTS_COMPLICATED, NAR_CONTENTS_HELLOWORLD,

View file

@ -8,7 +8,7 @@ pub use import::ingest_nar_and_hash;
pub use renderer::calculate_size_and_sha256;
pub use renderer::write_nar;
pub use renderer::SimpleRenderer;
use tvix_castore::directoryservice::Node;
use tvix_castore::Node;
#[async_trait]
pub trait NarCalculationService: Send + Sync {

View file

@ -10,7 +10,8 @@ use tracing::{instrument, Span};
use tracing_indicatif::span_ext::IndicatifSpanExt;
use tvix_castore::{
blobservice::BlobService,
directoryservice::{DirectoryService, NamedNode, Node},
directoryservice::DirectoryService,
{NamedNode, Node},
};
pub struct SimpleRenderer<BS, DS> {

View file

@ -1,10 +1,9 @@
use futures::stream::BoxStream;
use futures::StreamExt;
use tonic::async_trait;
use tvix_castore::directoryservice::Node;
use tvix_castore::fs::{RootNodes, TvixStoreFs};
use tvix_castore::{blobservice::BlobService, directoryservice::DirectoryService};
use tvix_castore::{Error, ValidateNodeError};
use tvix_castore::{Error, Node, ValidateNodeError};
use super::PathInfoService;

View file

@ -11,8 +11,8 @@ use tonic::{async_trait, Code};
use tracing::{instrument, Span};
use tracing_indicatif::span_ext::IndicatifSpanExt;
use tvix_castore::composition::{CompositionContext, ServiceBuilder};
use tvix_castore::directoryservice::Node;
use tvix_castore::Error;
use tvix_castore::Node;
/// Connects to a (remote) tvix-store PathInfoService over gRPC.
#[derive(Clone)]

View file

@ -109,7 +109,7 @@ mod test {
let root_node = p.node.as_mut().unwrap();
if let castorepb::Node { node: Some(node) } = root_node {
let n = node.to_owned();
*node = (&tvix_castore::directoryservice::Node::try_from(&n)
*node = (&tvix_castore::Node::try_from(&n)
.unwrap()
.rename("11111111111111111111111111111111-dummy2".into()))
.into();

View file

@ -9,8 +9,7 @@ use nix_compat::{
store_path::{self, StorePathRef},
};
use thiserror::Error;
use tvix_castore::directoryservice::NamedNode;
use tvix_castore::ValidateNodeError;
use tvix_castore::{NamedNode, ValidateNodeError};
mod grpc_pathinfoservice_wrapper;
@ -162,7 +161,7 @@ impl PathInfo {
None => Err(ValidatePathInfoError::NoNodePresent)?,
Some(node) => {
// TODO save result somewhere
let node: tvix_castore::directoryservice::Node = node
let node: tvix_castore::Node = node
.try_into()
.map_err(ValidatePathInfoError::InvalidRootNode)?;
// parse the name of the node itself and return

View file

@ -231,7 +231,7 @@ fn validate_symlink_empty_target_invalid() {
target: "".into(),
});
tvix_castore::directoryservice::Node::try_from(&node).expect_err("must fail validation");
tvix_castore::Node::try_from(&node).expect_err("must fail validation");
}
/// Create a node with a symlink target including null bytes, and ensure it
@ -243,7 +243,7 @@ fn validate_symlink_target_null_byte_invalid() {
target: "foo\0".into(),
});
tvix_castore::directoryservice::Node::try_from(&node).expect_err("must fail validation");
tvix_castore::Node::try_from(&node).expect_err("must fail validation");
}
/// Create a PathInfo with a correct deriver field and ensure it succeeds.

View file

@ -9,9 +9,8 @@ use std::io;
use std::sync::Arc;
use tokio::io::sink;
use tvix_castore::blobservice::BlobService;
use tvix_castore::directoryservice::{
DirectoryNode, DirectoryService, FileNode, Node, SymlinkNode,
};
use tvix_castore::directoryservice::DirectoryService;
use tvix_castore::{DirectoryNode, FileNode, Node, SymlinkNode};
#[rstest]
#[tokio::test]