Files
compiler-explorer/lib/execution/remote-execution-env.ts
Matt Godbolt 53c7dd328b Configure Biome import organiser with grouped imports (#8431)
Enable Biome's `organizeImports` with groups matching the original
ESLint `import/order` configuration:

1. **Node builtins** (`node:fs`, `path`, etc.)
2. *(blank line)*
3. **Third-party packages** (`express`, `@sentry/node`, etc.)
4. *(blank line)*
5. **Local/relative imports** (`../foo.js`, `./bar.js`, aliases)

This resolves the inconsistency where Biome wasn't enforcing import
grouping, meaning new files would lose the blank-line separation that
the old ESLint config enforced.

### Impact
- **354 files** updated out of 738 checked (~48%)
- **+188 / -240 lines** (net -52) — almost entirely single blank line
additions/removals between import groups
- No import reordering; purely group separator consistency

Fixes #7373

🤖 Generated by LLM (Claude, via OpenClaw)
2026-02-01 20:50:46 -06:00

110 lines
4.4 KiB
TypeScript

// Copyright (c) 2024, Compiler Explorer Authors
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are met:
//
// * Redistributions of source code must retain the above copyright notice,
// this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the distribution.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
// ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
// LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
// CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
// SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
// CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
// ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
// POSSIBILITY OF SUCH DAMAGE.
import crypto from 'node:crypto';
import {ExecutionParams} from '../../types/compilation/compilation.interfaces.js';
import {BasicExecutionResult, ExecutableExecutionOptions} from '../../types/execution/execution.interfaces.js';
import {CompilationEnvironment} from '../compilation-env.js';
import {logger} from '../logger.js';
import * as utils from '../utils.js';
import {BaseExecutionTriple} from './base-execution-triple.js';
import {EventsWsWaiter} from './events-websocket.js';
import {IExecutionEnvironment} from './execution-env.interfaces.js';
import {SqsExecuteRequester} from './sqs-execution-queue.js';
export class RemoteExecutionEnvironment implements IExecutionEnvironment {
private packageHash: string;
private triple: BaseExecutionTriple;
private execQueue: SqsExecuteRequester;
private guid: string;
private environment: CompilationEnvironment;
constructor(environment: CompilationEnvironment, triple: BaseExecutionTriple, executablePackageHash: string) {
this.environment = environment;
this.triple = triple;
this.guid = crypto.randomUUID();
this.packageHash = executablePackageHash;
this.execQueue = new SqsExecuteRequester(environment.ceProps, environment.awsProps);
logger.info(
`RemoteExecutionEnvironment with ${triple.toString()} and ${executablePackageHash} - guid ${this.guid}`,
);
}
async downloadExecutablePackage(hash: string): Promise<void> {
throw new Error('Method not implemented.');
}
private async queueRemoteExecution(params: ExecutionParams) {
await this.execQueue.push(this.triple, {
guid: this.guid,
hash: this.packageHash,
params: params,
});
}
async execute(params: ExecutionParams): Promise<BasicExecutionResult> {
const startTime = process.hrtime.bigint();
const waiter = new EventsWsWaiter(this.environment.ceProps);
try {
await waiter.subscribe(this.guid);
await this.queueRemoteExecution(params);
const result = await waiter.data();
await waiter.close();
const endTime = process.hrtime.bigint();
// change time to include overhead like SQS, WS, network etc
result.processExecutionResultTime = utils.deltaTimeNanoToMili(startTime, endTime) - result.execTime;
return result;
} catch {
waiter.close();
return {
code: -1,
stdout: [],
stderr: [{text: 'Internal error while trying to remotely execute'}],
timedOut: false,
execTime: 0,
okToCache: false,
filenameTransform: f => f,
};
}
}
async execBinary(
executable: string,
executeParameters: ExecutableExecutionOptions,
homeDir: string,
extraConfiguration?: any,
): Promise<BasicExecutionResult> {
throw new Error('Method not implemented.');
}
}