2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2018-06-06 04:51:56 -04:00
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2020-07-30 02:15:34 -04:00
|
|
|
"context"
|
2018-06-06 04:51:56 -04:00
|
|
|
"fmt"
|
2021-10-15 06:12:13 -04:00
|
|
|
"strconv"
|
2023-03-23 13:26:21 -04:00
|
|
|
"sync"
|
2018-06-06 04:51:56 -04:00
|
|
|
"time"
|
|
|
|
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/dsync"
|
2018-06-06 04:51:56 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// lockRequesterInfo stores various info from the client for each lock that is requested.
|
|
|
|
type lockRequesterInfo struct {
|
2021-03-03 21:36:43 -05:00
|
|
|
Name string // name of the resource lock was requested for
|
|
|
|
Writer bool // Bool whether write or read lock.
|
|
|
|
UID string // UID to uniquely identify request of client.
|
|
|
|
Timestamp time.Time // Timestamp set at the time of initialization.
|
|
|
|
TimeLastRefresh time.Time // Timestamp for last lock refresh.
|
|
|
|
Source string // Contains line, function and filename reqesting the lock.
|
|
|
|
Group bool // indicates if it was a group lock.
|
2020-09-25 22:21:52 -04:00
|
|
|
// Owner represents the UUID of the owner who originally requested the lock
|
|
|
|
// useful in expiry.
|
|
|
|
Owner string
|
2020-10-24 16:23:16 -04:00
|
|
|
// Quorum represents the quorum required for this lock to be active.
|
|
|
|
Quorum int
|
2021-10-15 06:12:13 -04:00
|
|
|
idx int
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// isWriteLock returns whether the lock is a write or read lock.
|
|
|
|
func isWriteLock(lri []lockRequesterInfo) bool {
|
2019-01-24 10:22:14 -05:00
|
|
|
return len(lri) == 1 && lri[0].Writer
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
2019-11-13 15:17:45 -05:00
|
|
|
// localLocker implements Dsync.NetLocker
|
|
|
|
type localLocker struct {
|
2023-03-23 13:26:21 -04:00
|
|
|
mutex sync.Mutex
|
2020-12-10 10:28:37 -05:00
|
|
|
lockMap map[string][]lockRequesterInfo
|
2021-10-15 06:12:13 -04:00
|
|
|
lockUID map[string]string // UUID -> resource map.
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
2019-11-13 15:17:45 -05:00
|
|
|
func (l *localLocker) String() string {
|
2020-12-10 10:28:37 -05:00
|
|
|
return globalEndpoints.Localhost()
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
2020-02-21 00:59:57 -05:00
|
|
|
func (l *localLocker) canTakeLock(resources ...string) bool {
|
|
|
|
for _, resource := range resources {
|
|
|
|
_, lockTaken := l.lockMap[resource]
|
2021-10-15 06:12:13 -04:00
|
|
|
if lockTaken {
|
|
|
|
return false
|
2020-02-21 00:59:57 -05:00
|
|
|
}
|
|
|
|
}
|
2021-10-15 06:12:13 -04:00
|
|
|
return true
|
2020-02-21 00:59:57 -05:00
|
|
|
}
|
|
|
|
|
2020-07-30 02:15:34 -04:00
|
|
|
func (l *localLocker) Lock(ctx context.Context, args dsync.LockArgs) (reply bool, err error) {
|
2021-10-18 11:38:33 -04:00
|
|
|
if len(args.Resources) > maxDeleteList {
|
|
|
|
return false, fmt.Errorf("internal error: localLocker.Lock called with more than %d resources", maxDeleteList)
|
|
|
|
}
|
|
|
|
|
2023-03-23 13:26:21 -04:00
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2020-02-21 00:59:57 -05:00
|
|
|
|
2020-09-25 22:21:52 -04:00
|
|
|
if !l.canTakeLock(args.Resources...) {
|
|
|
|
// Not all locks can be taken on resources,
|
|
|
|
// reject it completely.
|
|
|
|
return false, nil
|
|
|
|
}
|
2020-02-21 00:59:57 -05:00
|
|
|
|
2020-09-25 22:21:52 -04:00
|
|
|
// No locks held on the all resources, so claim write
|
|
|
|
// lock on all resources at once.
|
2021-10-15 06:12:13 -04:00
|
|
|
for i, resource := range args.Resources {
|
2020-09-25 22:21:52 -04:00
|
|
|
l.lockMap[resource] = []lockRequesterInfo{
|
|
|
|
{
|
2021-03-03 21:36:43 -05:00
|
|
|
Name: resource,
|
|
|
|
Writer: true,
|
|
|
|
Source: args.Source,
|
|
|
|
Owner: args.Owner,
|
|
|
|
UID: args.UID,
|
|
|
|
Timestamp: UTCNow(),
|
|
|
|
TimeLastRefresh: UTCNow(),
|
|
|
|
Group: len(args.Resources) > 1,
|
|
|
|
Quorum: args.Quorum,
|
2021-10-15 06:12:13 -04:00
|
|
|
idx: i,
|
2020-09-25 22:21:52 -04:00
|
|
|
},
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
2021-10-15 06:12:13 -04:00
|
|
|
l.lockUID[formatUUID(args.UID, i)] = resource
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
2020-09-25 22:21:52 -04:00
|
|
|
return true, nil
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
2021-10-15 06:12:13 -04:00
|
|
|
func formatUUID(s string, idx int) string {
|
|
|
|
return s + strconv.Itoa(idx)
|
|
|
|
}
|
|
|
|
|
2021-05-11 05:11:29 -04:00
|
|
|
func (l *localLocker) Unlock(_ context.Context, args dsync.LockArgs) (reply bool, err error) {
|
2021-10-18 11:38:33 -04:00
|
|
|
if len(args.Resources) > maxDeleteList {
|
|
|
|
return false, fmt.Errorf("internal error: localLocker.Unlock called with more than %d resources", maxDeleteList)
|
|
|
|
}
|
|
|
|
|
2023-03-23 13:26:21 -04:00
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2021-10-15 06:12:13 -04:00
|
|
|
err = nil
|
2020-02-21 00:59:57 -05:00
|
|
|
|
|
|
|
for _, resource := range args.Resources {
|
2022-09-02 17:24:32 -04:00
|
|
|
lri, ok := l.lockMap[resource]
|
|
|
|
if ok && !isWriteLock(lri) {
|
2021-10-15 06:12:13 -04:00
|
|
|
// Unless it is a write lock reject it.
|
|
|
|
err = fmt.Errorf("unlock attempted on a read locked entity: %s", resource)
|
|
|
|
continue
|
|
|
|
}
|
2020-10-26 13:29:29 -04:00
|
|
|
if ok {
|
2021-10-15 06:12:13 -04:00
|
|
|
reply = l.removeEntry(resource, args, &lri) || reply
|
2020-02-21 00:59:57 -05:00
|
|
|
}
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
2021-10-15 06:12:13 -04:00
|
|
|
return
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
2019-11-13 15:17:45 -05:00
|
|
|
// removeEntry based on the uid of the lock message, removes a single entry from the
|
|
|
|
// lockRequesterInfo array or the whole array from the map (in case of a write lock
|
|
|
|
// or last read lock)
|
2021-10-15 06:12:13 -04:00
|
|
|
// UID and optionally owner must match for entries to be deleted.
|
2020-09-25 22:21:52 -04:00
|
|
|
func (l *localLocker) removeEntry(name string, args dsync.LockArgs, lri *[]lockRequesterInfo) bool {
|
2019-11-13 15:17:45 -05:00
|
|
|
// Find correct entry to remove based on uid.
|
|
|
|
for index, entry := range *lri {
|
2021-10-15 06:12:13 -04:00
|
|
|
if entry.UID == args.UID && (args.Owner == "" || entry.Owner == args.Owner) {
|
2019-11-13 15:17:45 -05:00
|
|
|
if len(*lri) == 1 {
|
|
|
|
// Remove the write lock.
|
|
|
|
delete(l.lockMap, name)
|
|
|
|
} else {
|
|
|
|
// Remove the appropriate read lock.
|
|
|
|
*lri = append((*lri)[:index], (*lri)[index+1:]...)
|
|
|
|
l.lockMap[name] = *lri
|
|
|
|
}
|
2021-10-15 06:12:13 -04:00
|
|
|
delete(l.lockUID, formatUUID(args.UID, entry.idx))
|
2019-11-13 15:17:45 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// None found return false, perhaps entry removed in previous run.
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-07-30 02:15:34 -04:00
|
|
|
func (l *localLocker) RLock(ctx context.Context, args dsync.LockArgs) (reply bool, err error) {
|
perf: websocket grid connectivity for all internode communication (#18461)
This PR adds a WebSocket grid feature that allows servers to communicate via
a single two-way connection.
There are two request types:
* Single requests, which are `[]byte => ([]byte, error)`. This is for efficient small
roundtrips with small payloads.
* Streaming requests which are `[]byte, chan []byte => chan []byte (and error)`,
which allows for different combinations of full two-way streams with an initial payload.
Only a single stream is created between two machines - and there is, as such, no
server/client relation since both sides can initiate and handle requests. Which server
initiates the request is decided deterministically on the server names.
Requests are made through a mux client and server, which handles message
passing, congestion, cancelation, timeouts, etc.
If a connection is lost, all requests are canceled, and the calling server will try
to reconnect. Registered handlers can operate directly on byte
slices or use a higher-level generics abstraction.
There is no versioning of handlers/clients, and incompatible changes should
be handled by adding new handlers.
The request path can be changed to a new one for any protocol changes.
First, all servers create a "Manager." The manager must know its address
as well as all remote addresses. This will manage all connections.
To get a connection to any remote, ask the manager to provide it given
the remote address using.
```
func (m *Manager) Connection(host string) *Connection
```
All serverside handlers must also be registered on the manager. This will
make sure that all incoming requests are served. The number of in-flight
requests and responses must also be given for streaming requests.
The "Connection" returned manages the mux-clients. Requests issued
to the connection will be sent to the remote.
* `func (c *Connection) Request(ctx context.Context, h HandlerID, req []byte) ([]byte, error)`
performs a single request and returns the result. Any deadline provided on the request is
forwarded to the server, and canceling the context will make the function return at once.
* `func (c *Connection) NewStream(ctx context.Context, h HandlerID, payload []byte) (st *Stream, err error)`
will initiate a remote call and send the initial payload.
```Go
// A Stream is a two-way stream.
// All responses *must* be read by the caller.
// If the call is canceled through the context,
//The appropriate error will be returned.
type Stream struct {
// Responses from the remote server.
// Channel will be closed after an error or when the remote closes.
// All responses *must* be read by the caller until either an error is returned or the channel is closed.
// Canceling the context will cause the context cancellation error to be returned.
Responses <-chan Response
// Requests sent to the server.
// If the handler is defined with 0 incoming capacity this will be nil.
// Channel *must* be closed to signal the end of the stream.
// If the request context is canceled, the stream will no longer process requests.
Requests chan<- []byte
}
type Response struct {
Msg []byte
Err error
}
```
There are generic versions of the server/client handlers that allow the use of type
safe implementations for data types that support msgpack marshal/unmarshal.
2023-11-20 20:09:35 -05:00
|
|
|
if len(args.Resources) != 1 {
|
2021-10-15 06:12:13 -04:00
|
|
|
return false, fmt.Errorf("internal error: localLocker.RLock called with more than one resource")
|
|
|
|
}
|
|
|
|
|
2023-03-23 13:26:21 -04:00
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2021-01-25 13:01:27 -05:00
|
|
|
resource := args.Resources[0]
|
2020-09-25 22:21:52 -04:00
|
|
|
lrInfo := lockRequesterInfo{
|
2021-03-03 21:36:43 -05:00
|
|
|
Name: resource,
|
|
|
|
Writer: false,
|
|
|
|
Source: args.Source,
|
|
|
|
Owner: args.Owner,
|
|
|
|
UID: args.UID,
|
|
|
|
Timestamp: UTCNow(),
|
|
|
|
TimeLastRefresh: UTCNow(),
|
|
|
|
Quorum: args.Quorum,
|
2020-09-25 22:21:52 -04:00
|
|
|
}
|
|
|
|
if lri, ok := l.lockMap[resource]; ok {
|
|
|
|
if reply = !isWriteLock(lri); reply {
|
|
|
|
// Unless there is a write lock
|
|
|
|
l.lockMap[resource] = append(l.lockMap[resource], lrInfo)
|
2021-11-08 10:35:50 -05:00
|
|
|
l.lockUID[formatUUID(args.UID, 0)] = resource
|
2020-07-30 02:15:34 -04:00
|
|
|
}
|
2020-09-25 22:21:52 -04:00
|
|
|
} else {
|
|
|
|
// No locks held on the given name, so claim (first) read lock
|
|
|
|
l.lockMap[resource] = []lockRequesterInfo{lrInfo}
|
2021-11-08 10:35:50 -05:00
|
|
|
l.lockUID[formatUUID(args.UID, 0)] = resource
|
2020-09-25 22:21:52 -04:00
|
|
|
reply = true
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
2020-09-25 22:21:52 -04:00
|
|
|
return reply, nil
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
|
|
|
|
2021-05-11 05:11:29 -04:00
|
|
|
func (l *localLocker) RUnlock(_ context.Context, args dsync.LockArgs) (reply bool, err error) {
|
2021-10-15 06:12:13 -04:00
|
|
|
if len(args.Resources) > 1 {
|
|
|
|
return false, fmt.Errorf("internal error: localLocker.RUnlock called with more than one resource")
|
|
|
|
}
|
|
|
|
|
2023-03-23 13:26:21 -04:00
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2018-06-06 04:51:56 -04:00
|
|
|
var lri []lockRequesterInfo
|
2020-02-21 00:59:57 -05:00
|
|
|
|
|
|
|
resource := args.Resources[0]
|
|
|
|
if lri, reply = l.lockMap[resource]; !reply {
|
2018-06-06 04:51:56 -04:00
|
|
|
// No lock is held on the given name
|
2020-10-26 13:29:29 -04:00
|
|
|
return true, nil
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
2021-10-15 06:12:13 -04:00
|
|
|
if isWriteLock(lri) {
|
2018-06-06 04:51:56 -04:00
|
|
|
// A write-lock is held, cannot release a read lock
|
2021-10-15 06:12:13 -04:00
|
|
|
return false, fmt.Errorf("RUnlock attempted on a write locked entity: %s", resource)
|
2018-06-06 04:51:56 -04:00
|
|
|
}
|
2020-10-26 13:29:29 -04:00
|
|
|
l.removeEntry(resource, args, &lri)
|
2018-06-06 04:51:56 -04:00
|
|
|
return reply, nil
|
|
|
|
}
|
|
|
|
|
2023-04-04 00:23:24 -04:00
|
|
|
type lockStats struct {
|
|
|
|
Total int
|
|
|
|
Writes int
|
|
|
|
Reads int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (l *localLocker) stats() lockStats {
|
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
|
|
|
|
|
|
|
st := lockStats{Total: len(l.lockMap)}
|
|
|
|
for _, v := range l.lockMap {
|
|
|
|
if len(v) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
entry := v[0]
|
|
|
|
if entry.Writer {
|
|
|
|
st.Writes++
|
|
|
|
} else {
|
|
|
|
st.Reads += len(v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return st
|
|
|
|
}
|
|
|
|
|
2019-01-24 10:22:14 -05:00
|
|
|
func (l *localLocker) DupLockMap() map[string][]lockRequesterInfo {
|
2023-03-23 13:26:21 -04:00
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2019-01-24 10:22:14 -05:00
|
|
|
|
2021-10-15 06:12:13 -04:00
|
|
|
lockCopy := make(map[string][]lockRequesterInfo, len(l.lockMap))
|
2019-01-24 10:22:14 -05:00
|
|
|
for k, v := range l.lockMap {
|
2023-04-04 00:23:24 -04:00
|
|
|
if len(v) == 0 {
|
|
|
|
delete(l.lockMap, k)
|
|
|
|
continue
|
|
|
|
}
|
2021-10-15 06:12:13 -04:00
|
|
|
lockCopy[k] = append(make([]lockRequesterInfo, 0, len(v)), v...)
|
2019-01-24 10:22:14 -05:00
|
|
|
}
|
|
|
|
return lockCopy
|
|
|
|
}
|
2019-11-13 15:17:45 -05:00
|
|
|
|
|
|
|
func (l *localLocker) Close() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-10-08 15:32:32 -04:00
|
|
|
// IsOnline - local locker is always online.
|
2019-11-19 20:42:27 -05:00
|
|
|
func (l *localLocker) IsOnline() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-10-08 15:32:32 -04:00
|
|
|
// IsLocal - local locker returns true.
|
|
|
|
func (l *localLocker) IsLocal() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2021-01-25 13:01:27 -05:00
|
|
|
func (l *localLocker) ForceUnlock(ctx context.Context, args dsync.LockArgs) (reply bool, err error) {
|
2023-03-23 13:26:21 -04:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
return false, ctx.Err()
|
|
|
|
default:
|
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
|
|
|
if len(args.UID) == 0 {
|
|
|
|
for _, resource := range args.Resources {
|
2021-10-15 06:12:13 -04:00
|
|
|
lris, ok := l.lockMap[resource]
|
|
|
|
if !ok {
|
2023-03-23 13:26:21 -04:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
// Collect uids, so we don't mutate while we delete
|
|
|
|
uids := make([]string, 0, len(lris))
|
|
|
|
for _, lri := range lris {
|
|
|
|
uids = append(uids, lri.UID)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete collected uids:
|
|
|
|
for _, uid := range uids {
|
|
|
|
lris, ok := l.lockMap[resource]
|
|
|
|
if !ok {
|
|
|
|
// Just to be safe, delete uuids.
|
|
|
|
for idx := 0; idx < maxDeleteList; idx++ {
|
|
|
|
mapID := formatUUID(uid, idx)
|
|
|
|
if _, ok := l.lockUID[mapID]; !ok {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
delete(l.lockUID, mapID)
|
2021-10-15 06:12:13 -04:00
|
|
|
}
|
2023-03-23 13:26:21 -04:00
|
|
|
continue
|
2021-10-15 06:12:13 -04:00
|
|
|
}
|
2023-03-23 13:26:21 -04:00
|
|
|
l.removeEntry(resource, dsync.LockArgs{UID: uid}, &lris)
|
2021-10-15 06:12:13 -04:00
|
|
|
}
|
2021-08-27 11:59:36 -04:00
|
|
|
}
|
2023-03-23 13:26:21 -04:00
|
|
|
return true, nil
|
2021-01-25 13:01:27 -05:00
|
|
|
}
|
2021-08-27 11:59:36 -04:00
|
|
|
|
2023-03-23 13:26:21 -04:00
|
|
|
idx := 0
|
|
|
|
for {
|
|
|
|
mapID := formatUUID(args.UID, idx)
|
|
|
|
resource, ok := l.lockUID[mapID]
|
|
|
|
if !ok {
|
|
|
|
return idx > 0, nil
|
|
|
|
}
|
|
|
|
lris, ok := l.lockMap[resource]
|
|
|
|
if !ok {
|
|
|
|
// Unexpected inconsistency, delete.
|
|
|
|
delete(l.lockUID, mapID)
|
|
|
|
idx++
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
reply = true
|
|
|
|
l.removeEntry(resource, dsync.LockArgs{UID: args.UID}, &lris)
|
2021-10-15 06:12:13 -04:00
|
|
|
idx++
|
2021-01-25 13:01:27 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-03 21:36:43 -05:00
|
|
|
func (l *localLocker) Refresh(ctx context.Context, args dsync.LockArgs) (refreshed bool, err error) {
|
2023-03-23 13:26:21 -04:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
2020-07-30 02:15:34 -04:00
|
|
|
return false, ctx.Err()
|
2023-03-23 13:26:21 -04:00
|
|
|
default:
|
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2019-11-25 19:39:43 -05:00
|
|
|
|
2023-03-23 13:26:21 -04:00
|
|
|
// Check whether uid is still active.
|
|
|
|
resource, ok := l.lockUID[formatUUID(args.UID, 0)]
|
2021-10-15 06:12:13 -04:00
|
|
|
if !ok {
|
2023-03-23 13:26:21 -04:00
|
|
|
return false, nil
|
2021-10-15 06:12:13 -04:00
|
|
|
}
|
2023-03-23 13:26:21 -04:00
|
|
|
idx := 0
|
|
|
|
for {
|
|
|
|
lris, ok := l.lockMap[resource]
|
|
|
|
if !ok {
|
|
|
|
// Inconsistent. Delete UID.
|
|
|
|
delete(l.lockUID, formatUUID(args.UID, idx))
|
|
|
|
return idx > 0, nil
|
|
|
|
}
|
|
|
|
for i := range lris {
|
|
|
|
if lris[i].UID == args.UID {
|
|
|
|
lris[i].TimeLastRefresh = UTCNow()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
idx++
|
|
|
|
resource, ok = l.lockUID[formatUUID(args.UID, idx)]
|
|
|
|
if !ok {
|
|
|
|
// No more resources for UID, but we did update at least one.
|
|
|
|
return true, nil
|
2021-10-15 06:12:13 -04:00
|
|
|
}
|
2023-01-31 12:41:17 -05:00
|
|
|
}
|
2019-11-25 19:39:43 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Similar to removeEntry but only removes an entry only if the lock entry exists in map.
|
|
|
|
// Caller must hold 'l.mutex' lock.
|
2021-03-03 21:36:43 -05:00
|
|
|
func (l *localLocker) expireOldLocks(interval time.Duration) {
|
2023-03-23 13:26:21 -04:00
|
|
|
l.mutex.Lock()
|
|
|
|
defer l.mutex.Unlock()
|
2020-10-26 13:29:29 -04:00
|
|
|
|
2022-01-27 17:10:57 -05:00
|
|
|
for k, lris := range l.lockMap {
|
|
|
|
modified := false
|
|
|
|
for i := 0; i < len(lris); {
|
|
|
|
lri := &lris[i]
|
|
|
|
if time.Since(lri.TimeLastRefresh) > interval {
|
|
|
|
delete(l.lockUID, formatUUID(lri.UID, lri.idx))
|
|
|
|
if len(lris) == 1 {
|
|
|
|
// Remove the write lock.
|
|
|
|
delete(l.lockMap, lri.Name)
|
|
|
|
modified = false
|
2021-10-15 06:12:13 -04:00
|
|
|
break
|
|
|
|
}
|
2022-01-27 17:10:57 -05:00
|
|
|
modified = true
|
|
|
|
// Remove the appropriate lock.
|
|
|
|
lris = append(lris[:i], lris[i+1:]...)
|
|
|
|
// Check same i
|
|
|
|
} else {
|
|
|
|
// Move to next
|
|
|
|
i++
|
2021-10-15 06:12:13 -04:00
|
|
|
}
|
2022-01-27 17:10:57 -05:00
|
|
|
}
|
|
|
|
if modified {
|
|
|
|
l.lockMap[k] = lris
|
2021-03-03 21:36:43 -05:00
|
|
|
}
|
2019-11-25 19:39:43 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-10 10:28:37 -05:00
|
|
|
func newLocker() *localLocker {
|
2019-11-13 15:17:45 -05:00
|
|
|
return &localLocker{
|
2021-10-15 06:12:13 -04:00
|
|
|
lockMap: make(map[string][]lockRequesterInfo, 1000),
|
|
|
|
lockUID: make(map[string]string, 1000),
|
2019-11-13 15:17:45 -05:00
|
|
|
}
|
|
|
|
}
|