mirror of
https://github.com/apple/foundationdb.git
synced 2026-01-25 04:18:18 +00:00
Fix IDE build compiling errors
This commit is contained in:
@@ -1422,7 +1422,6 @@ ACTOR Future<Void> assignMutationsToStorageServers(CommitBatchContext* self) {
|
||||
ASSERT_EQ(encryptedMutations->size(), pMutations->size());
|
||||
}
|
||||
|
||||
state int64_t encryptDomain = FDB_DEFAULT_ENCRYPT_DOMAIN_ID;
|
||||
self->toCommit.addTransactionInfo(trs[self->transactionNum].spanContext);
|
||||
|
||||
for (; mutationNum < pMutations->size(); mutationNum++) {
|
||||
|
||||
@@ -140,6 +140,7 @@ ACTOR Future<Void> runIKVS(OpenKVStoreRequest openReq, IKVSInterface ikvsInterfa
|
||||
forwardPromise(onClosedReq.reply, kvStore->onClosed());
|
||||
}
|
||||
when(IKVSDisposeRequest disposeReq = waitNext(ikvsInterface.dispose.getFuture())) {
|
||||
(void)disposeReq; // suppress unused variable warning
|
||||
TraceEvent(SevDebug, "RemoteIKVSDisposeReceivedRequest").detail("UID", kvsId);
|
||||
kvStore->dispose();
|
||||
guard.invalidate();
|
||||
@@ -147,6 +148,7 @@ ACTOR Future<Void> runIKVS(OpenKVStoreRequest openReq, IKVSInterface ikvsInterfa
|
||||
return Void();
|
||||
}
|
||||
when(IKVSCloseRequest closeReq = waitNext(ikvsInterface.close.getFuture())) {
|
||||
(void)closeReq; // suppress unused variable warning
|
||||
TraceEvent(SevDebug, "RemoteIKVSCloseReceivedRequest").detail("UID", kvsId);
|
||||
kvStore->close();
|
||||
guard.invalidate();
|
||||
|
||||
@@ -4170,7 +4170,6 @@ const Role Role::TESTER("Tester", "TS");
|
||||
const Role Role::LOG_ROUTER("LogRouter", "LR");
|
||||
const Role Role::DATA_DISTRIBUTOR("DataDistributor", "DD");
|
||||
const Role Role::RATEKEEPER("Ratekeeper", "RK");
|
||||
const Role Role::STORAGE_CACHE("StorageCache", "SC");
|
||||
const Role Role::COORDINATOR("Coordinator", "CD");
|
||||
const Role Role::BACKUP("Backup", "BK");
|
||||
const Role Role::ENCRYPT_KEY_PROXY("EncryptKeyProxy", "EP");
|
||||
|
||||
@@ -187,8 +187,6 @@ struct BackupAndRestoreCorrectnessWorkload : TestWorkload {
|
||||
}
|
||||
|
||||
ACTOR Future<Void> _setup(Database cx, BackupAndRestoreCorrectnessWorkload* self) {
|
||||
state bool adjusted = false;
|
||||
|
||||
if (BUGGIFY) {
|
||||
for (auto r : getSystemBackupRanges()) {
|
||||
self->backupRanges.push_back_deep(self->backupRanges.arena(), r);
|
||||
|
||||
@@ -185,8 +185,6 @@ struct BackupAndRestorePartitionedCorrectnessWorkload : TestWorkload {
|
||||
}
|
||||
|
||||
ACTOR Future<Void> _setup(Database cx, BackupAndRestorePartitionedCorrectnessWorkload* self) {
|
||||
state bool adjusted = false;
|
||||
|
||||
if (BUGGIFY) {
|
||||
for (auto r : getSystemBackupRanges()) {
|
||||
self->backupRanges.push_back_deep(self->backupRanges.arena(), r);
|
||||
|
||||
@@ -643,7 +643,7 @@ struct BackupS3BlobCorrectnessWorkload : TestWorkload {
|
||||
Standalone<StringRef> restoreTag(self->backupTag.toString() + "_restore");
|
||||
// Pass lockDB=False since we already locked, unlockDB=True to release when done,
|
||||
// and our lockUID so restore uses the same lock for checkDatabaseLock calls
|
||||
Version _ = wait(backupAgent.restore(cx,
|
||||
Version v = wait(backupAgent.restore(cx,
|
||||
cx,
|
||||
restoreTag,
|
||||
KeyRef(lastBackupContainer->getURL()),
|
||||
@@ -662,7 +662,9 @@ struct BackupS3BlobCorrectnessWorkload : TestWorkload {
|
||||
lastBackupContainer->getEncryptionKeyFileName(),
|
||||
lockUID));
|
||||
|
||||
TraceEvent("BS3BCW_RestoreComplete").detail("BackupTag", printable(self->backupTag));
|
||||
TraceEvent("BS3BCW_RestoreComplete")
|
||||
.detail("BackupTag", printable(self->backupTag))
|
||||
.detail("RestoreVersion", v);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -98,6 +98,7 @@ struct ReadHotDetectionWorkload : TestWorkload {
|
||||
state Transaction tr(cx);
|
||||
try {
|
||||
StorageMetrics sm = wait(cx->getStorageMetrics(self->wholeRange, 100));
|
||||
(void)sm; // suppress unused variable warning
|
||||
// TraceEvent("RHDCheckPhaseLog")
|
||||
// .detail("KeyRangeSize", sm.bytes)
|
||||
// .detail("KeyRangeReadBandwidth", sm.bytesReadPerKSecond);
|
||||
|
||||
@@ -95,7 +95,6 @@ struct RestoreValidationWorkload : TestWorkload {
|
||||
// Wait for restore completion marker
|
||||
// BackupAndRestoreValidation sets this key when restore is fully complete
|
||||
state Key completionMarker = "\xff\x02/restoreValidationComplete"_sr;
|
||||
state bool restoreComplete = false;
|
||||
state int checkAttempts = 0;
|
||||
|
||||
TraceEvent("RestoreValidationWaitingForRestoreCompletion")
|
||||
@@ -109,7 +108,6 @@ struct RestoreValidationWorkload : TestWorkload {
|
||||
|
||||
Optional<Value> markerValue = wait(tr.get(completionMarker));
|
||||
if (markerValue.present()) {
|
||||
restoreComplete = true;
|
||||
TraceEvent("RestoreValidationRestoreComplete").detail("CheckAttempts", checkAttempts);
|
||||
break;
|
||||
}
|
||||
@@ -191,7 +189,6 @@ struct RestoreValidationWorkload : TestWorkload {
|
||||
// Monitor audit progress
|
||||
state double startTime = now();
|
||||
state double lastReportTime = startTime;
|
||||
state bool completed = false;
|
||||
state AuditPhase finalPhase = AuditPhase::Invalid;
|
||||
state std::string errorMessage;
|
||||
|
||||
@@ -264,7 +261,6 @@ struct RestoreValidationWorkload : TestWorkload {
|
||||
}
|
||||
|
||||
if (allComplete || anyError) {
|
||||
completed = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user