From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) by sourceware.org (Postfix) with ESMTPS id 1D6853858C50 for ; Thu, 1 Jun 2023 20:54:22 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 1D6853858C50 Authentication-Results: sourceware.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=google.com Received: by mail-wr1-x434.google.com with SMTP id ffacd0b85a97d-30af56f5f52so1269932f8f.1 for ; Thu, 01 Jun 2023 13:54:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1685652860; x=1688244860; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=r5FjbKIrUXWuunotwZ3Gc/WKBj7KoSpAnyYL3b+MnHA=; b=REAj4vDurwouw/YBEPvBbGmoKS9S34w2HUxjKqchIbm718yhFepSNb4Vk7rYUpWSf9 2pPzWjBo5gB24cFWhjra3y18bJXulu/sOdZzVz9UkKpod/D9RyIsQKgOtPLRUrQniDJE jRJMELFILzcK/ZKBX4bqvZ4grfXFeot2e3q3f5ykZExc/rE4aA0FkFgQKPcVk5pKPXSj ccaMjDECcXWGSG7Herox6pMyT2SNkh3t88hzvKZb9yfujFWQTfcTkvMHCiFUJCtjed5O K1QsjZe9YGJn7QfDlh0cx4tg27dT7mtvAq8NPXkXlnKLhC72BrasFivo3XV4uFfMimku 5zBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685652860; x=1688244860; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=r5FjbKIrUXWuunotwZ3Gc/WKBj7KoSpAnyYL3b+MnHA=; b=YrwRDNmCSf2kSNRERK1Asl4OyxvhzmcrffDeAWuIWm1qQsbfCDOn0w7kHilEYoRkdN Tm/49Ae+vNUKu6kz4PcXitE8WfZV2ppaKJ5AzFPicfpiT4snKMAV796I0TR5QzrlE9ut FmBgzfgY6sFpBQ7QfqxiOIXVSMv+Nlt38XVzJ0aGQ7bfz3+S1be6xBXyjEKAE1vkkqKe Z7AUbDzgKjeZqO6UYJjpBJ646Wz5DlIaIP38oG/rNCwj4zjAqU/muAp2mkPYDJmE+jE6 VCl6SSq7ksm1XOpFCszKw17QGDmRcInD7ifiTLmytTjA8UUA0OLxmXYpF7XjNpYh9ccU 5bjg== X-Gm-Message-State: AC+VfDzzvMGYL3cECwuHUlZrndxXR1Z3+SWJcNfcV7EaOlXlh+mB3O/G d8HV9/XjSSCfMs8zG5N3UwjptEfX+Mm+jVZmWnZX2nLzHsRy4RVwUZKWYQ== X-Google-Smtp-Source: ACHHUZ4aqpIWwzENYuvtfB2SGvtpcKZzMGihGXLy0SvjUtGlvux2xjMw5I/2AbsYrv0OY6lUZtPtU/SrhNkKl+1pcsM= X-Received: by 2002:adf:edc5:0:b0:30a:e977:de3d with SMTP id v5-20020adfedc5000000b0030ae977de3dmr2815590wro.28.1685652860175; Thu, 01 Jun 2023 13:54:20 -0700 (PDT) MIME-Version: 1.0 References: <20230531223555.GC26841@redhat.com> <20230601145810.GH26841@redhat.com> In-Reply-To: <20230601145810.GH26841@redhat.com> From: Daniel Thornburgh Date: Thu, 1 Jun 2023 13:54:09 -0700 Message-ID: Subject: Re: Local Build ID Directory Lookup (DEBUGINFOD_LOCAL_PATH) To: "Frank Ch. Eigler" Cc: elfutils-devel@sourceware.org Content-Type: multipart/alternative; boundary="000000000000f28eda05fd17a32f" X-Spam-Status: No, score=-17.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,ENV_AND_HDR_SPF_MATCH,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: --000000000000f28eda05fd17a32f Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hmm, how would the effective behavior of this differ from directly returning the path? The symlink could become invalid at any time, and it would become invalid in precisely the same scenarios that the original file would. A further request would in both cases stat the original file, and if it were missing, download a new copy into the cache via the usual mechanisms. It would make sense if the cache were made to contain a hard link to the file if it were on the same filesystem as the cache, but that inherits the usual problems with hard links. It would persist a copy of the file in the cache though. On Thu, Jun 1, 2023 at 7:58=E2=80=AFAM Frank Ch. Eigler w= rote: > Hi - > > > So I guess, sans the format, the feature request would just be that > > it would have a shortcut for file URLs to produce the path directly > > in response to e.g. a debuginfod_find_debuginfo, rather than making > > a copy of the file via libcurl. > > A compromise solution could be for new code to produce a symlink in > the .cache/debuginfod_client directory that points to the matching > file:// bit, and return that symlink name/fd to the calling app. > > At future accesses, the client can determine if the symlink is > broken and reject/unlink it. > > - FChE > > --=20 Daniel Thornburgh | dthorn@google.com --000000000000f28eda05fd17a32f--