blob: ea2ce3297add930e4397ab37b1cf1556077f6072 [file] [log] [blame]
// Copyright (C) 2009 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.googlesource.gerrit.plugins.replication.pull;
import static com.googlesource.gerrit.plugins.replication.ReplicationFileBasedConfig.replaceName;
import static com.googlesource.gerrit.plugins.replication.pull.FetchResultProcessing.resolveNodeName;
import static com.googlesource.gerrit.plugins.replication.pull.ReplicationType.SYNC;
import com.google.common.base.Throwables;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMap;
import com.google.common.collect.ImmutableSet;
import com.google.common.collect.ImmutableSet.Builder;
import com.google.common.collect.Lists;
import com.google.common.flogger.FluentLogger;
import com.google.gerrit.common.data.GroupReference;
import com.google.gerrit.entities.AccountGroup;
import com.google.gerrit.entities.BranchNameKey;
import com.google.gerrit.entities.Project;
import com.google.gerrit.entities.RefNames;
import com.google.gerrit.extensions.config.FactoryModule;
import com.google.gerrit.extensions.registration.DynamicItem;
import com.google.gerrit.extensions.restapi.AuthException;
import com.google.gerrit.server.CurrentUser;
import com.google.gerrit.server.PluginUser;
import com.google.gerrit.server.account.GroupBackend;
import com.google.gerrit.server.account.GroupBackends;
import com.google.gerrit.server.account.GroupIncludeCache;
import com.google.gerrit.server.account.ListGroupMembership;
import com.google.gerrit.server.events.EventDispatcher;
import com.google.gerrit.server.git.GitRepositoryManager;
import com.google.gerrit.server.git.PerThreadRequestScope;
import com.google.gerrit.server.git.WorkQueue;
import com.google.gerrit.server.permissions.PermissionBackend;
import com.google.gerrit.server.permissions.PermissionBackendException;
import com.google.gerrit.server.permissions.ProjectPermission;
import com.google.gerrit.server.permissions.RefPermission;
import com.google.gerrit.server.project.NoSuchProjectException;
import com.google.gerrit.server.project.ProjectCache;
import com.google.gerrit.server.project.ProjectState;
import com.google.gerrit.server.util.RequestContext;
import com.google.inject.Inject;
import com.google.inject.Injector;
import com.google.inject.Provider;
import com.google.inject.Provides;
import com.google.inject.assistedinject.Assisted;
import com.google.inject.assistedinject.FactoryModuleBuilder;
import com.google.inject.servlet.RequestScoped;
import com.googlesource.gerrit.plugins.replication.RemoteSiteUser;
import com.googlesource.gerrit.plugins.replication.ReplicationFilter;
import com.googlesource.gerrit.plugins.replication.pull.fetch.BatchFetchClient;
import com.googlesource.gerrit.plugins.replication.pull.fetch.CGitFetch;
import com.googlesource.gerrit.plugins.replication.pull.fetch.CGitFetchValidator;
import com.googlesource.gerrit.plugins.replication.pull.fetch.Fetch;
import com.googlesource.gerrit.plugins.replication.pull.fetch.FetchClientImplementation;
import com.googlesource.gerrit.plugins.replication.pull.fetch.FetchFactory;
import com.googlesource.gerrit.plugins.replication.pull.fetch.JGitFetch;
import java.io.IOException;
import java.io.UnsupportedEncodingException;
import java.net.URLEncoder;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Optional;
import java.util.Set;
import java.util.concurrent.Callable;
import java.util.concurrent.CompletableFuture;
import java.util.concurrent.Future;
import java.util.concurrent.ScheduledExecutorService;
import java.util.concurrent.TimeUnit;
import java.util.function.Supplier;
import org.apache.commons.io.FilenameUtils;
import org.apache.http.impl.client.CloseableHttpClient;
import org.eclipse.jgit.lib.Constants;
import org.eclipse.jgit.lib.Ref;
import org.eclipse.jgit.lib.RefUpdate;
import org.eclipse.jgit.lib.Repository;
import org.eclipse.jgit.transport.RefSpec;
import org.eclipse.jgit.transport.URIish;
import org.slf4j.Logger;
public class Source {
private static final Logger repLog = PullReplicationLogger.repLog;
private static final FluentLogger logger = FluentLogger.forEnclosingClass();
public interface Factory {
Source create(SourceConfiguration config);
}
private final ReplicationStateListener stateLog;
private final Object stateLock = new Object();
private final Map<URIish, FetchOne> pending = new HashMap<>();
private final Map<URIish, FetchOne> inFlight = new HashMap<>();
private final FetchOne.Factory opFactory;
private final GitRepositoryManager gitManager;
private final PermissionBackend permissionBackend;
private final Provider<CurrentUser> userProvider;
private final ProjectCache projectCache;
private volatile ScheduledExecutorService pool;
private final PerThreadRequestScope.Scoper threadScoper;
private final SourceConfiguration config;
private final DynamicItem<EventDispatcher> eventDispatcher;
private CloseableHttpClient httpClient;
protected enum RetryReason {
TRANSPORT_ERROR,
COLLISION,
REPOSITORY_MISSING
}
public static class QueueInfo {
public final Map<URIish, FetchOne> pending;
public final Map<URIish, FetchOne> inFlight;
public QueueInfo(Map<URIish, FetchOne> pending, Map<URIish, FetchOne> inFlight) {
this.pending = ImmutableMap.copyOf(pending);
this.inFlight = ImmutableMap.copyOf(inFlight);
}
}
@Inject
protected Source(
Injector injector,
@Assisted SourceConfiguration cfg,
PluginUser pluginUser,
GitRepositoryManager gitRepositoryManager,
PermissionBackend permissionBackend,
Provider<CurrentUser> userProvider,
ProjectCache projectCache,
GroupBackend groupBackend,
ReplicationStateListeners stateLog,
GroupIncludeCache groupIncludeCache,
DynamicItem<EventDispatcher> eventDispatcher) {
config = cfg;
this.eventDispatcher = eventDispatcher;
gitManager = gitRepositoryManager;
this.permissionBackend = permissionBackend;
this.userProvider = userProvider;
this.projectCache = projectCache;
this.stateLog = stateLog;
CurrentUser remoteUser;
if (!cfg.getAuthGroupNames().isEmpty()) {
Builder<AccountGroup.UUID> builder = ImmutableSet.builder();
for (String name : cfg.getAuthGroupNames()) {
GroupReference g = GroupBackends.findExactSuggestion(groupBackend, name);
if (g != null) {
builder.add(g.getUUID());
addRecursiveParents(g.getUUID(), builder, groupIncludeCache);
} else {
repLog.warn("Group \"{}\" not recognized, removing from authGroup", name);
}
}
remoteUser = new RemoteSiteUser(new ListGroupMembership(builder.build()));
} else {
remoteUser = pluginUser;
}
Injector child =
injector.createChildInjector(
new FactoryModule() {
@Override
protected void configure() {
bindScope(RequestScoped.class, PerThreadRequestScope.REQUEST);
bind(PerThreadRequestScope.Propagator.class);
bind(Source.class).toInstance(Source.this);
bind(SourceConfiguration.class).toInstance(config);
install(new FactoryModuleBuilder().build(FetchOne.Factory.class));
Class<? extends Fetch> clientClass =
cfg.useCGitClient() ? CGitFetch.class : JGitFetch.class;
install(
new FactoryModuleBuilder()
.implement(Fetch.class, BatchFetchClient.class)
.implement(Fetch.class, FetchClientImplementation.class, clientClass)
.build(FetchFactory.class));
}
@Provides
public PerThreadRequestScope.Scoper provideScoper(
final PerThreadRequestScope.Propagator propagator) {
final RequestContext requestContext =
new RequestContext() {
@Override
public CurrentUser getUser() {
return remoteUser;
}
};
return new PerThreadRequestScope.Scoper() {
@Override
public <T> Callable<T> scope(Callable<T> callable) {
return propagator.scope(requestContext, callable);
}
};
}
});
child.getBinding(FetchFactory.class).acceptTargetVisitor(new CGitFetchValidator());
opFactory = child.getInstance(FetchOne.Factory.class);
threadScoper = child.getInstance(PerThreadRequestScope.Scoper.class);
}
public synchronized CloseableHttpClient memoize(
Supplier<CloseableHttpClient> httpClientSupplier) {
if (httpClient == null) {
httpClient = httpClientSupplier.get();
}
return httpClient;
}
private void addRecursiveParents(
AccountGroup.UUID g,
Builder<AccountGroup.UUID> builder,
GroupIncludeCache groupIncludeCache) {
for (AccountGroup.UUID p : groupIncludeCache.parentGroupsOf(g)) {
if (builder.build().contains(p)) {
continue;
}
builder.add(p);
addRecursiveParents(p, builder, groupIncludeCache);
}
}
public QueueInfo getQueueInfo() {
synchronized (stateLock) {
return new QueueInfo(pending, inFlight);
}
}
public void start(WorkQueue workQueue) {
String poolName = "ReplicateFrom-" + config.getRemoteConfig().getName();
pool = workQueue.createQueue(config.getPoolThreads(), poolName);
}
public synchronized int shutdown() {
int cnt = 0;
if (pool != null) {
cnt = pool.shutdownNow().size();
pool = null;
}
if (httpClient != null) {
try {
httpClient.close();
httpClient = null;
} catch (IOException e) {
logger.atSevere().withCause(e).log("Error occurred while closing HTTP client connections");
}
}
return cnt;
}
private boolean shouldReplicate(ProjectState state, CurrentUser user)
throws PermissionBackendException {
if (!config.replicateHiddenProjects()
&& state.getProject().getState()
== com.google.gerrit.extensions.client.ProjectState.HIDDEN) {
return false;
}
// Hidden projects(permitsRead = false) should only be accessible by the project owners.
// READ_CONFIG is checked here because it's only allowed to project owners(ACCESS may also
// be allowed for other users).
ProjectPermission permissionToCheck =
state.statePermitsRead() ? ProjectPermission.ACCESS : ProjectPermission.READ_CONFIG;
try {
permissionBackend.user(user).project(state.getNameKey()).check(permissionToCheck);
return true;
} catch (AuthException e) {
return false;
}
}
private boolean shouldReplicate(
final Project.NameKey project, String ref, ReplicationState... states) {
try {
return threadScoper
.scope(
new Callable<Boolean>() {
@Override
public Boolean call() throws NoSuchProjectException, PermissionBackendException {
ProjectState projectState;
try {
projectState = projectCache.checkedGet(project);
} catch (IOException e) {
repLog.warn(
"NOT scheduling replication {}:{} because could not open source project",
project,
ref,
e);
return false;
}
if (projectState == null) {
repLog.warn(
"NOT scheduling replication {}:{} because project does not exist",
project,
ref);
throw new NoSuchProjectException(project);
}
if (!projectState.statePermitsRead()) {
repLog.warn(
"NOT scheduling replication {}:{} because project is not readable",
project,
ref);
return false;
}
if (!shouldReplicate(projectState, userProvider.get())) {
repLog.warn(
"NOT scheduling replication {}:{} because project is supposed to be replicated",
project,
ref);
return false;
}
if (FetchOne.ALL_REFS.equals(ref)) {
return true;
}
try {
if (!ref.startsWith(RefNames.REFS_CHANGES)) {
permissionBackend
.user(userProvider.get())
.project(project)
.ref(ref)
.check(RefPermission.READ);
}
} catch (AuthException e) {
repLog.warn(
"NOT scheduling replication {}:{} because lack of permissions to access project/ref",
project,
ref);
return false;
}
return true;
}
})
.call();
} catch (NoSuchProjectException err) {
stateLog.error(String.format("source project %s not available", project), err, states);
} catch (Exception e) {
Throwables.throwIfUnchecked(e);
throw new RuntimeException(e);
}
repLog.warn("NOT scheduling replication {}:{}", project, ref);
return false;
}
private boolean shouldReplicate(Project.NameKey project, ReplicationState... states) {
try {
return threadScoper
.scope(
new Callable<Boolean>() {
@Override
public Boolean call() throws NoSuchProjectException, PermissionBackendException {
ProjectState projectState;
try {
projectState = projectCache.checkedGet(project);
} catch (IOException e) {
return false;
}
if (projectState == null) {
throw new NoSuchProjectException(project);
}
return shouldReplicate(projectState, userProvider.get());
}
})
.call();
} catch (NoSuchProjectException err) {
stateLog.error(String.format("source project %s not available", project), err, states);
} catch (Exception e) {
Throwables.throwIfUnchecked(e);
throw new RuntimeException(e);
}
return false;
}
public Future<?> schedule(
Project.NameKey project,
String ref,
ReplicationState state,
ReplicationType replicationType) {
URIish uri = getURI(project);
return schedule(project, ref, uri, state, replicationType);
}
public Future<?> schedule(
Project.NameKey project,
String ref,
URIish uri,
ReplicationState state,
ReplicationType replicationType) {
repLog.info("scheduling replication {}:{} => {}", uri, ref, project);
if (!shouldReplicate(project, ref, state)) {
return CompletableFuture.completedFuture(null);
}
if (!config.replicatePermissions()) {
FetchOne e;
synchronized (stateLock) {
e = pending.get(uri);
}
if (e == null) {
try (Repository git = gitManager.openRepository(project)) {
try {
Ref head = git.exactRef(Constants.HEAD);
if (head != null
&& head.isSymbolic()
&& RefNames.REFS_CONFIG.equals(head.getLeaf().getName())) {
return CompletableFuture.completedFuture(null);
}
} catch (IOException err) {
stateLog.error(String.format("cannot check type of project %s", project), err, state);
return CompletableFuture.completedFuture(null);
}
} catch (IOException err) {
stateLog.error(String.format("source project %s not available", project), err, state);
return CompletableFuture.completedFuture(null);
}
}
}
synchronized (stateLock) {
FetchOne e = pending.get(uri);
Future<?> f = CompletableFuture.completedFuture(null);
if (e == null) {
e = opFactory.create(project, uri);
addRef(e, ref);
e.addState(ref, state);
pending.put(uri, e);
f = pool.schedule(e, isSyncCall(replicationType) ? 0 : config.getDelay(), TimeUnit.SECONDS);
} else if (!e.getRefs().contains(ref)) {
addRef(e, ref);
e.addState(ref, state);
}
state.increaseFetchTaskCount(project.get(), ref);
repLog.info("scheduled {}:{} => {} to run after {}s", e, ref, project, config.getDelay());
return f;
}
}
void fetchWasCanceled(FetchOne fetchOp) {
synchronized (stateLock) {
URIish uri = fetchOp.getURI();
pending.remove(uri);
}
}
private void addRef(FetchOne e, String ref) {
e.addRef(ref);
postReplicationScheduledEvent(e, ref);
}
private boolean isSyncCall(ReplicationType replicationType) {
return SYNC.equals(replicationType);
}
/**
* It schedules again a FetchOp instance.
*
* <p>If the reason for rescheduling is to avoid a collision with an in-flight push to the same
* URI, we don't mark the operation as "retrying," and we schedule using the replication delay,
* rather than the retry delay. Otherwise, the operation is marked as "retrying" and scheduled to
* run following the minutes count determined by class attribute retryDelay.
*
* <p>In case the FetchOp instance to be scheduled has same URI than one marked as "retrying," it
* adds to the one pending the refs list of the parameter instance.
*
* <p>In case the FetchOp instance to be scheduled has the same URI as one pending, but not marked
* "retrying," it indicates the one pending should be canceled when it starts executing, removes
* it from pending list, and adds its refs to the parameter instance. The parameter instance is
* scheduled for retry.
*
* <p>Notice all operations to indicate a FetchOp should be canceled, or it is retrying, or
* remove/add it from/to pending Map should be protected by synchronizing on the stateLock object.
*
* @param fetchOp The FetchOp instance to be scheduled.
*/
void reschedule(FetchOne fetchOp, RetryReason reason) {
synchronized (stateLock) {
URIish uri = fetchOp.getURI();
FetchOne pendingFetchOp = pending.get(uri);
if (pendingFetchOp != null) {
// There is one FetchOp instance already pending to same URI.
if (pendingFetchOp.isRetrying()) {
// The one pending is one already retrying, so it should
// maintain it and add to it the refs of the one passed
// as parameter to the method.
// This scenario would happen if a FetchOp has started running
// and then before it failed due transport exception, another
// one to same URI started. The first one would fail and would
// be rescheduled, being present in pending list. When the
// second one fails, it will also be rescheduled and then,
// here, find out replication to its URI is already pending
// for retry (blocking).
pendingFetchOp.addRefs(fetchOp.getRefs());
pendingFetchOp.addStates(fetchOp.getStates());
fetchOp.removeStates();
} else {
// The one pending is one that is NOT retrying, it was just
// scheduled believing no problem would happen. The one pending
// should be canceled, and this is done by setting its canceled
// flag, removing it from pending list, and adding its refs to
// the fetchOp instance that should then, later, in this method,
// be scheduled for retry.
// Notice that the FetchOp found pending will start running and,
// when notifying it is starting (with pending lock protection),
// it will see it was canceled and then it will do nothing with
// pending list and it will not execute its run implementation.
pendingFetchOp.canceledByReplication();
pending.remove(uri);
fetchOp.addRefs(pendingFetchOp.getRefs());
fetchOp.addStates(pendingFetchOp.getStates());
pendingFetchOp.removeStates();
}
}
if (pendingFetchOp == null || !pendingFetchOp.isRetrying()) {
pending.put(uri, fetchOp);
switch (reason) {
case COLLISION:
pool.schedule(fetchOp, config.getRescheduleDelay(), TimeUnit.SECONDS);
break;
case TRANSPORT_ERROR:
case REPOSITORY_MISSING:
default:
RefUpdate.Result trackingRefUpdate =
RetryReason.REPOSITORY_MISSING.equals(reason)
? RefUpdate.Result.NOT_ATTEMPTED
: RefUpdate.Result.REJECTED_OTHER_REASON;
postReplicationFailedEvent(fetchOp, trackingRefUpdate);
if (fetchOp.setToRetry()) {
postReplicationScheduledEvent(fetchOp);
pool.schedule(fetchOp, config.getRetryDelay(), TimeUnit.MINUTES);
} else {
fetchOp.canceledByReplication();
pending.remove(uri);
stateLog.error(
"Fetch from " + fetchOp.getURI() + " cancelled after maximum number of retries",
fetchOp.getStatesAsArray());
}
break;
}
}
}
}
boolean requestRunway(FetchOne op) {
synchronized (stateLock) {
if (op.wasCanceled()) {
return false;
}
pending.remove(op.getURI());
if (inFlight.containsKey(op.getURI())) {
return false;
}
inFlight.put(op.getURI(), op);
}
return true;
}
void notifyFinished(FetchOne op) {
synchronized (stateLock) {
inFlight.remove(op.getURI());
}
}
public boolean wouldFetchRef(String ref) {
if (!config.replicatePermissions() && RefNames.REFS_CONFIG.equals(ref)) {
return false;
}
if (FetchOne.ALL_REFS.equals(ref)) {
return true;
}
for (RefSpec s : config.getRemoteConfig().getFetchRefSpecs()) {
if (s.matchSource(ref)) {
return true;
}
}
return false;
}
public boolean wouldFetchProject(Project.NameKey project) {
if (!shouldReplicate(project)) {
return false;
}
// by default fetch all projects
List<String> projects = config.getProjects();
if (projects.isEmpty()) {
return true;
}
return (new ReplicationFilter(projects)).matches(project);
}
public boolean isSingleProjectMatch() {
return config.isSingleProjectMatch();
}
List<URIish> getURIs(Project.NameKey project, String urlMatch) {
List<URIish> r = Lists.newArrayListWithCapacity(config.getRemoteConfig().getURIs().size());
for (URIish uri : config.getRemoteConfig().getURIs()) {
if (matches(uri, urlMatch)) {
Optional<String> replacedPath = convertToPath(project, uri);
replacedPath.ifPresent(
path -> {
r.add(uri.setPath(path));
});
}
}
return r;
}
public URIish getURI(Project.NameKey project) {
if (config.getRemoteConfig().getURIs().size() != 1) {
throw new IllegalStateException(
String.format(
"Pull replication source %s must have only one url property.", project.get()));
}
URIish uri = config.getRemoteConfig().getURIs().get(0);
Optional<String> replacedPathOpt = convertToPath(project, uri);
String replacedPath =
replacedPathOpt.orElseThrow(
() ->
new IllegalStateException(
String.format(
"Remote config %s url %s does not contain ${name} field",
config.getRemoteConfig().getName(), uri.getPath())));
return uri.setPath(replacedPath);
}
private Optional<String> convertToPath(Project.NameKey project, URIish uri) {
String name = project.get();
if (needsUrlEncoding(uri)) {
name = encode(name);
}
String remoteNameStyle = config.getRemoteNameStyle();
if (remoteNameStyle.equals("dash")) {
name = name.replace("/", "-");
} else if (remoteNameStyle.equals("underscore")) {
name = name.replace("/", "_");
} else if (remoteNameStyle.equals("basenameOnly")) {
name = FilenameUtils.getBaseName(name);
} else if (!remoteNameStyle.equals("slash")) {
repLog.debug("Unknown remoteNameStyle: {}, falling back to slash", remoteNameStyle);
}
return Optional.ofNullable(replaceName(uri.getPath(), name, isSingleProjectMatch()));
}
static boolean needsUrlEncoding(URIish uri) {
return "http".equalsIgnoreCase(uri.getScheme())
|| "https".equalsIgnoreCase(uri.getScheme())
|| "amazon-s3".equalsIgnoreCase(uri.getScheme());
}
static String encode(String str) {
try {
// Some cleanup is required. The '/' character is always encoded as %2F
// however remote servers will expect it to be not encoded as part of the
// path used to the repository. Space is incorrectly encoded as '+' for this
// context. In the path part of a URI space should be %20, but in form data
// space is '+'. Our cleanup replace fixes these two issues.
return URLEncoder.encode(str, "UTF-8").replaceAll("%2[fF]", "/").replace("+", "%20");
} catch (UnsupportedEncodingException e) {
throw new RuntimeException(e);
}
}
ImmutableList<String> getAdminUrls() {
return config.getAdminUrls();
}
ImmutableList<String> getUrls() {
return config.getUrls();
}
ImmutableList<String> getAuthGroupNames() {
return config.getAuthGroupNames();
}
ImmutableList<String> getProjects() {
return config.getProjects();
}
int getLockErrorMaxRetries() {
return config.getLockErrorMaxRetries();
}
public String getRemoteConfigName() {
return config.getRemoteConfig().getName();
}
public int getTimeout() {
return config.getRemoteConfig().getTimeout();
}
public ImmutableList<String> getApis() {
return config.getApis();
}
public int getConnectionTimeout() {
return config.getConnectionTimeout();
}
public int getIdleTimeout() {
return config.getIdleTimeout();
}
public int getMaxConnectionsPerRoute() {
return config.getMaxConnectionsPerRoute();
}
public int getMaxConnections() {
return config.getMaxConnections();
}
public int getMaxRetries() {
return config.getMaxRetries();
}
private static boolean matches(URIish uri, String urlMatch) {
if (urlMatch == null || urlMatch.equals("") || urlMatch.equals("*")) {
return true;
}
return uri.toString().contains(urlMatch);
}
private void postReplicationScheduledEvent(FetchOne fetchOp) {
postReplicationScheduledEvent(fetchOp, null);
}
private void postReplicationScheduledEvent(FetchOne fetchOp, String inputRef) {
Set<String> refs = inputRef == null ? fetchOp.getRefs() : ImmutableSet.of(inputRef);
Project.NameKey project = fetchOp.getProjectNameKey();
String targetNode = resolveNodeName(fetchOp.getURI());
for (String ref : refs) {
FetchReplicationScheduledEvent event =
new FetchReplicationScheduledEvent(project.get(), ref, targetNode);
try {
eventDispatcher.get().postEvent(BranchNameKey.create(project, ref), event);
} catch (PermissionBackendException e) {
repLog.error("error posting event", e);
}
}
}
private void postReplicationFailedEvent(FetchOne fetchOp, RefUpdate.Result result) {
Project.NameKey project = fetchOp.getProjectNameKey();
String sourceNode = resolveNodeName(fetchOp.getURI());
try {
Context.setLocalEvent(true);
for (String ref : fetchOp.getRefs()) {
FetchRefReplicatedEvent event =
new FetchRefReplicatedEvent(
project.get(), ref, sourceNode, ReplicationState.RefFetchResult.FAILED, result);
try {
eventDispatcher.get().postEvent(BranchNameKey.create(project, ref), event);
} catch (PermissionBackendException e) {
repLog.error("error posting event", e);
}
}
} finally {
Context.unsetLocalEvent();
}
}
}