| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | /* | 
					
						
							|  |  |  |  * Minio Cloud Storage, (C) 2016 Minio, Inc. | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
					
						
							|  |  |  |  * you may not use this file except in compliance with the License. | 
					
						
							|  |  |  |  * You may obtain a copy of the License at | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  *     http://www.apache.org/licenses/LICENSE-2.0
 | 
					
						
							|  |  |  |  * | 
					
						
							|  |  |  |  * Unless required by applicable law or agreed to in writing, software | 
					
						
							|  |  |  |  * distributed under the License is distributed on an "AS IS" BASIS, | 
					
						
							|  |  |  |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
					
						
							|  |  |  |  * See the License for the specific language governing permissions and | 
					
						
							|  |  |  |  * limitations under the License. | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-19 05:50:50 +08:00
										 |  |  | package cmd | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	"math/rand" | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 	"net/rpc" | 
					
						
							|  |  |  | 	"path" | 
					
						
							|  |  |  | 	"sync" | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 	"time" | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	router "github.com/gorilla/mux" | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	"github.com/minio/dsync" | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | const ( | 
					
						
							|  |  |  | 	// Lock rpc server endpoint.
 | 
					
						
							| 
									
										
										
										
											2017-02-17 06:52:14 +08:00
										 |  |  | 	lockRPCPath = "/lock" | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	// Lock maintenance interval.
 | 
					
						
							|  |  |  | 	lockMaintenanceInterval = 1 * time.Minute // 1 minute.
 | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	// Lock validity check interval.
 | 
					
						
							|  |  |  | 	lockValidityCheckInterval = 2 * time.Minute // 2 minutes.
 | 
					
						
							|  |  |  | ) | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | // lockRequesterInfo stores various info from the client for each lock that is requested
 | 
					
						
							|  |  |  | type lockRequesterInfo struct { | 
					
						
							|  |  |  | 	writer        bool      // Bool whether write or read lock
 | 
					
						
							|  |  |  | 	node          string    // Network address of client claiming lock
 | 
					
						
							|  |  |  | 	rpcPath       string    // RPC path of client claiming lock
 | 
					
						
							|  |  |  | 	uid           string    // Uid to uniquely identify request of client
 | 
					
						
							|  |  |  | 	timestamp     time.Time // Timestamp set at the time of initialization
 | 
					
						
							|  |  |  | 	timeLastCheck time.Time // Timestamp for last check of validity of lock
 | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // isWriteLock returns whether the lock is a write or read lock
 | 
					
						
							|  |  |  | func isWriteLock(lri []lockRequesterInfo) bool { | 
					
						
							|  |  |  | 	return len(lri) == 1 && lri[0].writer | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // lockServer is type for RPC handlers
 | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | type lockServer struct { | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	AuthRPCServer | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	rpcPath string | 
					
						
							|  |  |  | 	mutex   sync.Mutex | 
					
						
							|  |  |  | 	lockMap map[string][]lockRequesterInfo | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | // Start lock maintenance from all lock servers.
 | 
					
						
							|  |  |  | func startLockMaintainence(lockServers []*lockServer) { | 
					
						
							|  |  |  | 	for _, locker := range lockServers { | 
					
						
							|  |  |  | 		// Start loop for stale lock maintenance
 | 
					
						
							|  |  |  | 		go func(lk *lockServer) { | 
					
						
							|  |  |  | 			// Initialize a new ticker with a minute between each ticks.
 | 
					
						
							|  |  |  | 			ticker := time.NewTicker(lockMaintenanceInterval) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 			// Start with random sleep time, so as to avoid "synchronous checks" between servers
 | 
					
						
							|  |  |  | 			time.Sleep(time.Duration(rand.Float64() * float64(lockMaintenanceInterval))) | 
					
						
							|  |  |  | 			for { | 
					
						
							|  |  |  | 				// Verifies every minute for locks held more than 2minutes.
 | 
					
						
							|  |  |  | 				select { | 
					
						
							|  |  |  | 				case <-ticker.C: | 
					
						
							|  |  |  | 					lk.lockMaintenance(lockValidityCheckInterval) | 
					
						
							|  |  |  | 				case <-globalServiceDoneCh: | 
					
						
							|  |  |  | 					// Stop the timer.
 | 
					
						
							|  |  |  | 					ticker.Stop() | 
					
						
							|  |  |  | 				} | 
					
						
							|  |  |  | 			} | 
					
						
							|  |  |  | 		}(locker) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-10-06 03:48:07 +08:00
										 |  |  | // Register distributed NS lock handlers.
 | 
					
						
							| 
									
										
										
										
											2016-10-13 14:13:24 +08:00
										 |  |  | func registerDistNSLockRouter(mux *router.Router, serverConfig serverCmdConfig) error { | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	// Initialize a new set of lock servers.
 | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	lockServers := newLockServers(serverConfig) | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// Start lock maintenance from all lock servers.
 | 
					
						
							|  |  |  | 	startLockMaintainence(lockServers) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Register initialized lock servers to their respective rpc endpoints.
 | 
					
						
							| 
									
										
										
										
											2016-10-13 14:13:24 +08:00
										 |  |  | 	return registerStorageLockers(mux, lockServers) | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // Create one lock server for every local storage rpc server.
 | 
					
						
							| 
									
										
										
										
											2016-10-27 18:30:52 +08:00
										 |  |  | func newLockServers(srvConfig serverCmdConfig) (lockServers []*lockServer) { | 
					
						
							|  |  |  | 	for _, ep := range srvConfig.endpoints { | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 		// Initialize new lock server for each local node.
 | 
					
						
							|  |  |  | 		if isLocalStorage(ep) { | 
					
						
							|  |  |  | 			// Create handler for lock RPCs
 | 
					
						
							|  |  |  | 			locker := &lockServer{ | 
					
						
							|  |  |  | 				rpcPath: getPath(ep), | 
					
						
							|  |  |  | 				mutex:   sync.Mutex{}, | 
					
						
							|  |  |  | 				lockMap: make(map[string][]lockRequesterInfo), | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 			} | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 			lockServers = append(lockServers, locker) | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	return lockServers | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // registerStorageLockers - register locker rpc handlers for net/rpc library clients
 | 
					
						
							| 
									
										
										
										
											2016-10-13 14:13:24 +08:00
										 |  |  | func registerStorageLockers(mux *router.Router, lockServers []*lockServer) error { | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	for _, lockServer := range lockServers { | 
					
						
							|  |  |  | 		lockRPCServer := rpc.NewServer() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 		if err := lockRPCServer.RegisterName("Dsync", lockServer); err != nil { | 
					
						
							| 
									
										
										
										
											2016-10-13 14:13:24 +08:00
										 |  |  | 			return traceError(err) | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2017-02-17 06:52:14 +08:00
										 |  |  | 		lockRouter := mux.PathPrefix(minioReservedBucketPath).Subrouter() | 
					
						
							|  |  |  | 		lockRouter.Path(path.Join(lockRPCPath, lockServer.rpcPath)).Handler(lockRPCServer) | 
					
						
							| 
									
										
										
										
											2016-08-24 10:19:24 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-10-13 14:13:24 +08:00
										 |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | ///  Distributed lock handlers
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-27 18:16:52 +08:00
										 |  |  | // Lock - rpc handler for (single) write lock operation.
 | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | func (l *lockServer) Lock(args *LockArgs, reply *bool) error { | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 	l.mutex.Lock() | 
					
						
							|  |  |  | 	defer l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	if err := args.IsAuthenticated(); err != nil { | 
					
						
							| 
									
										
										
										
											2016-08-24 10:19:24 +08:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	_, *reply = l.lockMap[args.LockArgs.Resource] | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	if !*reply { // No locks held on the given name, so claim write lock
 | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 		l.lockMap[args.LockArgs.Resource] = []lockRequesterInfo{ | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 			{ | 
					
						
							|  |  |  | 				writer:        true, | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 				node:          args.LockArgs.ServerAddr, | 
					
						
							|  |  |  | 				rpcPath:       args.LockArgs.ServiceEndpoint, | 
					
						
							|  |  |  | 				uid:           args.LockArgs.UID, | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 				timestamp:     time.Now().UTC(), | 
					
						
							|  |  |  | 				timeLastCheck: time.Now().UTC(), | 
					
						
							|  |  |  | 			}, | 
					
						
							|  |  |  | 		} | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	*reply = !*reply // Negate *reply to return true when lock is granted or false otherwise
 | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-27 18:16:52 +08:00
										 |  |  | // Unlock - rpc handler for (single) write unlock operation.
 | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | func (l *lockServer) Unlock(args *LockArgs, reply *bool) error { | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 	l.mutex.Lock() | 
					
						
							|  |  |  | 	defer l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	if err := args.IsAuthenticated(); err != nil { | 
					
						
							| 
									
										
										
										
											2016-08-24 10:19:24 +08:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	var lri []lockRequesterInfo | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if lri, *reply = l.lockMap[args.LockArgs.Resource]; !*reply { // No lock is held on the given name
 | 
					
						
							|  |  |  | 		return fmt.Errorf("Unlock attempted on an unlocked entity: %s", args.LockArgs.Resource) | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	if *reply = isWriteLock(lri); !*reply { // Unless it is a write lock
 | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 		return fmt.Errorf("Unlock attempted on a read locked entity: %s (%d read locks active)", args.LockArgs.Resource, len(lri)) | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if !l.removeEntry(args.LockArgs.Resource, args.LockArgs.UID, &lri) { | 
					
						
							|  |  |  | 		return fmt.Errorf("Unlock unable to find corresponding lock for uid: %s", args.LockArgs.UID) | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-27 18:16:52 +08:00
										 |  |  | // RLock - rpc handler for read lock operation.
 | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | func (l *lockServer) RLock(args *LockArgs, reply *bool) error { | 
					
						
							| 
									
										
										
										
											2016-08-15 07:57:01 +08:00
										 |  |  | 	l.mutex.Lock() | 
					
						
							|  |  |  | 	defer l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	if err := args.IsAuthenticated(); err != nil { | 
					
						
							| 
									
										
										
										
											2016-08-24 10:19:24 +08:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	lrInfo := lockRequesterInfo{ | 
					
						
							|  |  |  | 		writer:        false, | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 		node:          args.LockArgs.ServerAddr, | 
					
						
							|  |  |  | 		rpcPath:       args.LockArgs.ServiceEndpoint, | 
					
						
							|  |  |  | 		uid:           args.LockArgs.UID, | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 		timestamp:     time.Now().UTC(), | 
					
						
							|  |  |  | 		timeLastCheck: time.Now().UTC(), | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if lri, ok := l.lockMap[args.LockArgs.Resource]; ok { | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 		if *reply = !isWriteLock(lri); *reply { // Unless there is a write lock
 | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 			l.lockMap[args.LockArgs.Resource] = append(l.lockMap[args.LockArgs.Resource], lrInfo) | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	} else { // No locks held on the given name, so claim (first) read lock
 | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 		l.lockMap[args.LockArgs.Resource] = []lockRequesterInfo{lrInfo} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 		*reply = true | 
					
						
							| 
									
										
										
										
											2016-08-15 07:57:01 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-08-27 18:16:52 +08:00
										 |  |  | // RUnlock - rpc handler for read unlock operation.
 | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | func (l *lockServer) RUnlock(args *LockArgs, reply *bool) error { | 
					
						
							| 
									
										
										
										
											2016-08-15 07:57:01 +08:00
										 |  |  | 	l.mutex.Lock() | 
					
						
							|  |  |  | 	defer l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	if err := args.IsAuthenticated(); err != nil { | 
					
						
							| 
									
										
										
										
											2016-08-24 10:19:24 +08:00
										 |  |  | 		return err | 
					
						
							| 
									
										
										
										
											2016-08-23 02:01:21 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	var lri []lockRequesterInfo | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if lri, *reply = l.lockMap[args.LockArgs.Resource]; !*reply { // No lock is held on the given name
 | 
					
						
							|  |  |  | 		return fmt.Errorf("RUnlock attempted on an unlocked entity: %s", args.LockArgs.Resource) | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	if *reply = !isWriteLock(lri); !*reply { // A write-lock is held, cannot release a read lock
 | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 		return fmt.Errorf("RUnlock attempted on a write locked entity: %s", args.LockArgs.Resource) | 
					
						
							| 
									
										
										
										
											2016-08-15 07:57:01 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if !l.removeEntry(args.LockArgs.Resource, args.LockArgs.UID, &lri) { | 
					
						
							|  |  |  | 		return fmt.Errorf("RUnlock unable to find corresponding read lock for uid: %s", args.LockArgs.UID) | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-10-17 16:53:29 +08:00
										 |  |  | // ForceUnlock - rpc handler for force unlock operation.
 | 
					
						
							|  |  |  | func (l *lockServer) ForceUnlock(args *LockArgs, reply *bool) error { | 
					
						
							|  |  |  | 	l.mutex.Lock() | 
					
						
							|  |  |  | 	defer l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	if err := args.IsAuthenticated(); err != nil { | 
					
						
							| 
									
										
										
										
											2016-10-17 16:53:29 +08:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if len(args.LockArgs.UID) != 0 { | 
					
						
							|  |  |  | 		return fmt.Errorf("ForceUnlock called with non-empty UID: %s", args.LockArgs.UID) | 
					
						
							| 
									
										
										
										
											2016-10-17 16:53:29 +08:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if _, ok := l.lockMap[args.LockArgs.Resource]; ok { // Only clear lock when set
 | 
					
						
							|  |  |  | 		delete(l.lockMap, args.LockArgs.Resource) // Remove the lock (irrespective of write or read lock)
 | 
					
						
							| 
									
										
										
										
											2016-10-17 16:53:29 +08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	*reply = true | 
					
						
							|  |  |  | 	return nil | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | // Expired - rpc handler for expired lock status.
 | 
					
						
							|  |  |  | func (l *lockServer) Expired(args *LockArgs, reply *bool) error { | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	l.mutex.Lock() | 
					
						
							|  |  |  | 	defer l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	if err := args.IsAuthenticated(); err != nil { | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 		return err | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	// Lock found, proceed to verify if belongs to given uid.
 | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	if lri, ok := l.lockMap[args.LockArgs.Resource]; ok { | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 		// Check whether uid is still active
 | 
					
						
							|  |  |  | 		for _, entry := range lri { | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 			if entry.uid == args.LockArgs.UID { | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 				*reply = false // When uid found, lock is still active so return not expired.
 | 
					
						
							|  |  |  | 				return nil     // When uid found *reply is set to true.
 | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 			} | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2017-01-09 12:37:53 +08:00
										 |  |  | 	// When we get here lock is no longer active due to either args.LockArgs.Resource
 | 
					
						
							|  |  |  | 	// being absent from map or uid not found for given args.LockArgs.Resource
 | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	*reply = true | 
					
						
							|  |  |  | 	return nil | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // nameLockRequesterInfoPair is a helper type for lock maintenance
 | 
					
						
							|  |  |  | type nameLockRequesterInfoPair struct { | 
					
						
							|  |  |  | 	name string | 
					
						
							|  |  |  | 	lri  lockRequesterInfo | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | // lockMaintenance loops over locks that have been active for some time and checks back
 | 
					
						
							|  |  |  | // with the original server whether it is still alive or not
 | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | //
 | 
					
						
							|  |  |  | // Following logic inside ignores the errors generated for Dsync.Active operation.
 | 
					
						
							|  |  |  | // - server at client down
 | 
					
						
							|  |  |  | // - some network error (and server is up normally)
 | 
					
						
							|  |  |  | //
 | 
					
						
							|  |  |  | // We will ignore the error, and we will retry later to get a resolve on this lock
 | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | func (l *lockServer) lockMaintenance(interval time.Duration) { | 
					
						
							|  |  |  | 	l.mutex.Lock() | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	// Get list of long lived locks to check for staleness.
 | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	nlripLongLived := getLongLivedLocks(l.lockMap, interval) | 
					
						
							|  |  |  | 	l.mutex.Unlock() | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 	serverCred := serverConfig.GetCredential() | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 	// Validate if long lived locks are indeed clean.
 | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 	for _, nlrip := range nlripLongLived { | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 		// Initialize client based on the long live locks.
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 		c := newLockRPCClient(authConfig{ | 
					
						
							|  |  |  | 			accessKey:       serverCred.AccessKey, | 
					
						
							|  |  |  | 			secretKey:       serverCred.SecretKey, | 
					
						
							|  |  |  | 			serverAddr:      nlrip.lri.node, | 
					
						
							|  |  |  | 			serviceEndpoint: nlrip.lri.rpcPath, | 
					
						
							| 
									
										
										
										
											2017-01-12 05:59:51 +08:00
										 |  |  | 			secureConn:      globalIsSSL, | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 			serviceName:     "Dsync", | 
					
						
							|  |  |  | 		}) | 
					
						
							| 
									
										
										
										
											2016-09-16 15:30:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		// Call back to original server verify whether the lock is still active (based on name & uid)
 | 
					
						
							| 
									
										
										
										
											2016-12-23 23:12:19 +08:00
										 |  |  | 		expired, _ := c.Expired(dsync.LockArgs{UID: nlrip.lri.uid, Resource: nlrip.name}) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 		// Close the connection regardless of the call response.
 | 
					
						
							|  |  |  | 		c.rpcClient.Close() | 
					
						
							| 
									
										
										
										
											2016-09-20 04:14:55 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | 		// For successful response, verify if lock is indeed active or stale.
 | 
					
						
							|  |  |  | 		if expired { | 
					
						
							|  |  |  | 			// The lock is no longer active at server that originated the lock
 | 
					
						
							|  |  |  | 			// So remove the lock from the map.
 | 
					
						
							|  |  |  | 			l.mutex.Lock() | 
					
						
							|  |  |  | 			l.removeEntryIfExists(nlrip) // Purge the stale entry if it exists.
 | 
					
						
							|  |  |  | 			l.mutex.Unlock() | 
					
						
							| 
									
										
										
										
											2016-08-01 05:11:14 +08:00
										 |  |  | 		} | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | } |