4ed71b34de
And avoid migrate --update/--aply migrating when the new key was already present in the repository, and got dropped. Luckily, the location log allows distinguishing from the new key never having been present! That is mostly useful for --apply because otherwise dropped files would keep coming back until the old objects were reaped as unused. But it seemed to make sense to also do it for --update. for consistency in edge cases if nothing else. One case where --update can use it is when one branch got migrated earlier, and we dropped the file, and now another branch has migrated the same file. Sponsored-by: Jack Hill on Patreon
196 lines
6.3 KiB
Haskell
196 lines
6.3 KiB
Haskell
{- git-annex command
|
|
-
|
|
- Copyright 2011-2023 Joey Hess <id@joeyh.name>
|
|
-
|
|
- Licensed under the GNU AGPL version 3 or higher.
|
|
-}
|
|
|
|
module Command.Migrate where
|
|
|
|
import Command
|
|
import Backend
|
|
import Types.Backend (canUpgradeKey, fastMigrate)
|
|
import Types.KeySource
|
|
import Annex.Content
|
|
import qualified Command.ReKey
|
|
import qualified Command.Fsck
|
|
import qualified Annex
|
|
import Logs.Migrate
|
|
import Logs.MetaData
|
|
import Logs.Web
|
|
import Logs.Location
|
|
import Utility.Metered
|
|
import qualified Database.Keys
|
|
import Git.FilePath
|
|
import Annex.Link
|
|
import Annex.UUID
|
|
|
|
cmd :: Command
|
|
cmd = withAnnexOptions [backendOption, annexedMatchingOptions, jsonOptions] $
|
|
command "migrate" SectionUtility
|
|
"switch data to different backend"
|
|
paramPaths (seek <$$> optParser)
|
|
|
|
data MigrateOptions = MigrateOptions
|
|
{ migrateThese :: CmdParams
|
|
, updateOption :: Bool
|
|
, applyOption :: Bool
|
|
, removeSize :: Bool
|
|
}
|
|
|
|
optParser :: CmdParamsDesc -> Parser MigrateOptions
|
|
optParser desc = MigrateOptions
|
|
<$> cmdParams desc
|
|
<*> switch
|
|
( long "update"
|
|
<> help "incrementally apply migrations performed elsewhere"
|
|
)
|
|
<*> switch
|
|
( long "apply"
|
|
<> help "(re)apply migrations performed elsewhere"
|
|
)
|
|
<*> switch
|
|
( long "remove-size"
|
|
<> help "remove size field from keys"
|
|
)
|
|
|
|
seek :: MigrateOptions -> CommandSeek
|
|
seek o
|
|
| updateOption o || applyOption o = do
|
|
unless (null (migrateThese o)) $
|
|
error "Cannot combine --update or --apply with files to migrate."
|
|
streamNewDistributedMigrations (not (applyOption o)) $
|
|
\oldkey newkey ->
|
|
commandAction $ update oldkey newkey
|
|
| otherwise = do
|
|
withFilesInGitAnnex ww seeker =<< workTreeItems ww (migrateThese o)
|
|
commitMigration
|
|
where
|
|
ww = WarnUnmatchLsFiles "migrate"
|
|
seeker = AnnexedFileSeeker
|
|
{ startAction = start o
|
|
, checkContentPresent = Nothing
|
|
, usesLocationLog = False
|
|
}
|
|
|
|
start :: MigrateOptions -> Maybe KeySha -> SeekInput -> RawFilePath -> Key -> CommandStart
|
|
start o ksha si file key = do
|
|
forced <- Annex.getRead Annex.force
|
|
v <- Backend.getBackend (fromRawFilePath file) key
|
|
case v of
|
|
Nothing -> stop
|
|
Just oldbackend -> do
|
|
exists <- inAnnex key
|
|
newbackend <- chooseBackend file
|
|
if (newbackend /= oldbackend || upgradableKey oldbackend key || forced) && exists
|
|
then go False oldbackend newbackend
|
|
else if removeSize o && exists
|
|
then go True oldbackend oldbackend
|
|
else stop
|
|
where
|
|
go onlyremovesize oldbackend newbackend = do
|
|
keyrec <- case ksha of
|
|
Just (KeySha s) -> pure (MigrationRecord s)
|
|
Nothing -> error "internal"
|
|
starting "migrate" (mkActionItem (key, file)) si $
|
|
perform onlyremovesize o file key keyrec oldbackend newbackend
|
|
|
|
{- Checks if a key is upgradable to a newer representation.
|
|
-
|
|
- Reasons for migration:
|
|
- - Ideally, all keys have file size metadata. Old keys may not.
|
|
- - Something has changed in the backend, such as a bug fix.
|
|
-}
|
|
upgradableKey :: Backend -> Key -> Bool
|
|
upgradableKey backend key = isNothing (fromKey keySize key) || backendupgradable
|
|
where
|
|
backendupgradable = maybe False (\a -> a key) (canUpgradeKey backend)
|
|
|
|
{- Store the old backend's key in the new backend
|
|
- The old backend's key is not dropped from it, because there may
|
|
- be other files still pointing at that key.
|
|
-
|
|
- To ensure that the data we have for the old key is valid, it's
|
|
- fscked here. First we generate the new key. This ensures that the
|
|
- data cannot get corrupted after the fsck but before the new key is
|
|
- generated.
|
|
-}
|
|
perform :: Bool -> MigrateOptions -> RawFilePath -> Key -> MigrationRecord -> Backend -> Backend -> CommandPerform
|
|
perform onlyremovesize o file oldkey oldkeyrec oldbackend newbackend = go =<< genkey (fastMigrate oldbackend)
|
|
where
|
|
go Nothing = stop
|
|
go (Just (newkey, knowngoodcontent))
|
|
| knowngoodcontent = finish (removesize newkey)
|
|
| otherwise = stopUnless checkcontent $
|
|
finish (removesize newkey)
|
|
checkcontent = Command.Fsck.checkBackend oldbackend oldkey KeyPresent afile
|
|
finish newkey = ifM (Command.ReKey.linkKey file oldkey newkey)
|
|
( do
|
|
_ <- copyMetaData oldkey newkey
|
|
-- If the old key had some associated urls, record them for
|
|
-- the new key as well.
|
|
urls <- getUrls oldkey
|
|
forM_ urls $ \url ->
|
|
setUrlPresent newkey url
|
|
next $ Command.ReKey.cleanup file newkey $
|
|
logMigration oldkeyrec
|
|
, giveup "failed creating link from old to new key"
|
|
)
|
|
genkey _ | onlyremovesize = return $ Just (oldkey, False)
|
|
genkey Nothing = do
|
|
content <- calcRepo $ gitAnnexLocation oldkey
|
|
let source = KeySource
|
|
{ keyFilename = file
|
|
, contentLocation = content
|
|
, inodeCache = Nothing
|
|
}
|
|
newkey <- fst <$> genKey source nullMeterUpdate newbackend
|
|
return $ Just (newkey, False)
|
|
genkey (Just fm) = fm oldkey newbackend afile >>= \case
|
|
Just newkey -> return (Just (newkey, True))
|
|
Nothing -> genkey Nothing
|
|
removesize k
|
|
| removeSize o = alterKey k $ \kd -> kd { keySize = Nothing }
|
|
| otherwise = k
|
|
afile = AssociatedFile (Just file)
|
|
|
|
update :: Key -> Key -> CommandStart
|
|
update oldkey newkey =
|
|
stopUnless (allowed <&&> available <&&> wanted) $ do
|
|
ai <- findworktreefile >>= return . \case
|
|
Just f -> ActionItemAssociatedFile (AssociatedFile (Just f)) newkey
|
|
Nothing -> ActionItemKey newkey
|
|
starting "migrate" ai (SeekInput []) $
|
|
ifM (Command.ReKey.linkKey' v oldkey newkey)
|
|
( do
|
|
logStatus newkey InfoPresent
|
|
next $ return True
|
|
, next $ return False
|
|
)
|
|
where
|
|
available = (not <$> inAnnex newkey) <&&> inAnnex oldkey
|
|
|
|
-- annex.securehashesonly will block adding keys with insecure
|
|
-- hashes, this check is only to avoid doing extra work and
|
|
-- displaying a message when it fails.
|
|
allowed = isNothing <$> checkSecureHashes newkey
|
|
|
|
-- If the new key was previous present in this repository, but got
|
|
-- dropped, assume the user still doesn't want it there.
|
|
wanted = loggedPreviousLocations newkey >>= \case
|
|
[] -> pure True
|
|
us -> do
|
|
u <- getUUID
|
|
pure (u `notElem` us)
|
|
|
|
findworktreefile = do
|
|
fs <- Database.Keys.getAssociatedFiles newkey
|
|
g <- Annex.gitRepo
|
|
firstM (\f -> (== Just newkey) <$> isAnnexLink f) $
|
|
map (\f -> simplifyPath (fromTopFilePath f g)) fs
|
|
|
|
-- Always verify the content agains the newkey, even if
|
|
-- annex.verify is unset. This is done to prent bad migration
|
|
-- information maliciously injected into the git-annex branch
|
|
-- from populating files with the wrong content.
|
|
v = AlwaysVerify
|