/* * Minio Cloud Storage, (C) 2016 Minio, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package cmd import ( "errors" pathpkg "path" "strconv" "strings" "sync" "github.com/minio/dsync" ) // Global name space lock. var nsMutex *nsLockMap // Initialize distributed locking only in case of distributed setup. // Returns if the setup is distributed or not on success. func initDsyncNodes(disks []string, port int) (bool, error) { // Holds a bool indicating whether this server instance is part of // distributed setup or not. var isDist = false // List of lock servers that part in the co-operative namespace locking. var dsyncNodes []string // Corresponding rpc paths needed for communication over net/rpc var rpcPaths []string // Port to connect to for the lock servers in a distributed setup. serverPort := strconv.Itoa(port) for _, disk := range disks { if idx := strings.LastIndex(disk, ":"); idx != -1 { dsyncNodes = append(dsyncNodes, disk[:idx]+":"+serverPort) rpcPaths = append(rpcPaths, pathpkg.Join(lockRPCPath, disk[idx+1:])) } if !isLocalStorage(disk) { // One or more disks supplied as arguments are not // attached to the local node. isDist = true } } // Initialize rpc lock client information only if this instance is a // distributed setup. if isDist { return isDist, dsync.SetNodesWithPath(dsyncNodes, rpcPaths) } return isDist, nil } // initNSLock - initialize name space lock map. func initNSLock(isDist bool) { nsMutex = &nsLockMap{ isDist: isDist, lockMap: make(map[nsParam]*nsLock), } } // RWLocker - interface that any read-write locking library should implement. type RWLocker interface { sync.Locker RLock() RUnlock() } // nsParam - carries name space resource. type nsParam struct { volume string path string } // nsLock - provides primitives for locking critical namespace regions. type nsLock struct { RWLocker ref uint } // nsLockMap - namespace lock map, provides primitives to Lock, // Unlock, RLock and RUnlock. type nsLockMap struct { isDist bool // indicates whether the locking service is part of a distributed setup or not. lockMap map[nsParam]*nsLock lockMapMutex sync.Mutex } // Lock the namespace resource. func (n *nsLockMap) lock(volume, path string, readLock bool) { var nsLk *nsLock n.lockMapMutex.Lock() param := nsParam{volume, path} nsLk, found := n.lockMap[param] if !found { nsLk = &nsLock{ RWLocker: func() RWLocker { if n.isDist { return dsync.NewDRWMutex(pathpkg.Join(volume, path)) } return &sync.RWMutex{} }(), ref: 0, } n.lockMap[param] = nsLk } nsLk.ref++ // Update ref count here to avoid multiple races. // Unlock map before Locking NS which might block. n.lockMapMutex.Unlock() // Locking here can block. if readLock { nsLk.RLock() } else { nsLk.Lock() } } // Unlock the namespace resource. func (n *nsLockMap) unlock(volume, path string, readLock bool) { // nsLk.Unlock() will not block, hence locking the map for the entire function is fine. n.lockMapMutex.Lock() defer n.lockMapMutex.Unlock() param := nsParam{volume, path} if nsLk, found := n.lockMap[param]; found { if readLock { nsLk.RUnlock() } else { nsLk.Unlock() } if nsLk.ref == 0 { errorIf(errors.New("Namespace reference count cannot be 0."), "Invalid reference count detected.") } if nsLk.ref != 0 { nsLk.ref-- } if nsLk.ref == 0 { // Remove from the map if there are no more references. delete(n.lockMap, param) } } } // Lock - locks the given resource for writes, using a previously // allocated name space lock or initializing a new one. func (n *nsLockMap) Lock(volume, path string) { readLock := false n.lock(volume, path, readLock) } // Unlock - unlocks any previously acquired write locks. func (n *nsLockMap) Unlock(volume, path string) { readLock := false n.unlock(volume, path, readLock) } // RLock - locks any previously acquired read locks. func (n *nsLockMap) RLock(volume, path string) { readLock := true n.lock(volume, path, readLock) } // RUnlock - unlocks any previously acquired read locks. func (n *nsLockMap) RUnlock(volume, path string) { readLock := true n.unlock(volume, path, readLock) }