graphvent/lockable.go

416 lines
14 KiB
Go

package graphvent
import (
2023-08-15 18:23:06 -06:00
"github.com/google/uuid"
2023-11-03 22:51:54 -06:00
"time"
)
2023-08-15 18:23:06 -06:00
type ReqState byte
2023-08-11 16:00:36 -06:00
const (
Unlocked = ReqState(0)
Unlocking = ReqState(1)
Locked = ReqState(2)
Locking = ReqState(3)
2023-08-15 18:23:06 -06:00
AbortingLock = ReqState(4)
2023-08-11 16:00:36 -06:00
)
2023-11-03 22:51:54 -06:00
var ReqStateStrings = map[ReqState]string {
Unlocked: "Unlocked",
Unlocking: "Unlocking",
Locked: "Locked",
Locking: "Locking",
AbortingLock: "AbortingLock",
}
2023-08-11 16:00:36 -06:00
type LockableExt struct{
State ReqState `gv:"state"`
ReqID *uuid.UUID `gv:"req_id"`
Owner *NodeID `gv:"owner"`
PendingOwner *NodeID `gv:"pending_owner"`
PendingID uuid.UUID `gv:"pending_id"`
2023-11-03 22:51:54 -06:00
Requirements map[NodeID]ReqState `gv:"requirements"`
WaitInfos WaitMap `gv:"wait_infos"`
}
2023-07-25 21:43:15 -06:00
func (ext *LockableExt) Type() ExtType {
return LockableExtType
}
func NewLockableExt(requirements []NodeID) *LockableExt {
2023-11-03 22:51:54 -06:00
var reqs map[NodeID]ReqState = nil
2023-08-11 16:00:36 -06:00
if requirements != nil {
2023-11-03 22:51:54 -06:00
reqs = map[NodeID]ReqState{}
2023-08-11 16:00:36 -06:00
for _, id := range(requirements) {
2023-11-03 22:51:54 -06:00
reqs[id] = Unlocked
2023-08-11 16:00:36 -06:00
}
}
2023-07-26 11:56:10 -06:00
return &LockableExt{
2023-08-15 18:23:06 -06:00
State: Unlocked,
Owner: nil,
PendingOwner: nil,
Requirements: reqs,
2023-11-03 22:51:54 -06:00
WaitInfos: WaitMap{},
2023-07-26 11:56:10 -06:00
}
}
func UnlockLockable(ctx *Context, node *Node) (uuid.UUID, error) {
2023-10-07 23:00:07 -06:00
messages := Messages{}
2023-08-15 18:23:06 -06:00
signal := NewLockSignal("unlock")
messages = messages.Add(ctx, node.ID, node, nil, signal)
2023-10-07 23:00:07 -06:00
return signal.ID(), ctx.Send(messages)
}
func LockLockable(ctx *Context, node *Node) (uuid.UUID, error) {
2023-10-07 23:00:07 -06:00
messages := Messages{}
2023-08-15 18:23:06 -06:00
signal := NewLockSignal("lock")
messages = messages.Add(ctx, node.ID, node, nil, signal)
2023-10-07 23:00:07 -06:00
return signal.ID(), ctx.Send(messages)
}
2023-10-07 23:00:07 -06:00
func (ext *LockableExt) HandleErrorSignal(ctx *Context, node *Node, source NodeID, signal *ErrorSignal) (Messages, Changes) {
var messages Messages = nil
var changes Changes = nil
2023-11-03 22:51:54 -06:00
info, info_found := node.ProcessResponse(ext.WaitInfos, signal)
if info_found {
state, found := ext.Requirements[info.NodeID]
if found == true {
ctx.Log.Logf("lockable", "got mapped response %+v for %+v in state %s", signal, info, ReqStateStrings[state])
switch state {
case Locking:
ext.State = AbortingLock
ext.Requirements[info.NodeID] = Unlocked
for id, state := range(ext.Requirements) {
if state == Locked {
ext.Requirements[id] = Unlocking
lock_signal := NewLockSignal("unlock")
ext.WaitInfos[lock_signal.Id] = node.QueueTimeout(id, lock_signal, 100*time.Millisecond)
messages = messages.Add(ctx, id, node, nil, lock_signal)
ctx.Log.Logf("lockable", "sent abort unlock to %s from %s", id, node.ID)
}
}
2023-11-03 22:51:54 -06:00
case Unlocking:
2023-08-11 16:00:36 -06:00
}
2023-11-03 22:51:54 -06:00
} else {
ctx.Log.Logf("lockable", "Got mapped error %s, but %s isn't a requirement", signal, info.NodeID)
}
2023-08-15 18:23:06 -06:00
}
2023-10-07 23:00:07 -06:00
return messages, changes
2023-08-15 18:23:06 -06:00
}
2023-10-07 23:00:07 -06:00
func (ext *LockableExt) HandleLinkSignal(ctx *Context, node *Node, source NodeID, signal *LinkSignal) (Messages, Changes) {
var messages Messages = nil
var changes Changes = nil
if ext.State == Unlocked {
switch signal.Action {
case "add":
_, exists := ext.Requirements[signal.NodeID]
if exists == true {
messages = messages.Add(ctx, source, node, nil, NewErrorSignal(signal.ID(), "already_requirement"))
} else {
if ext.Requirements == nil {
2023-11-03 22:51:54 -06:00
ext.Requirements = map[NodeID]ReqState{}
}
2023-11-03 22:51:54 -06:00
ext.Requirements[signal.NodeID] = Unlocked
2023-10-08 02:22:02 -06:00
changes = changes.Add("requirement_added")
messages = messages.Add(ctx, source, node, nil, NewSuccessSignal(signal.ID()))
}
case "remove":
_, exists := ext.Requirements[signal.NodeID]
if exists == false {
messages = messages.Add(ctx, source, node, nil, NewErrorSignal(signal.ID(), "can't link: not_requirement"))
} else {
delete(ext.Requirements, signal.NodeID)
2023-10-08 02:22:02 -06:00
changes = changes.Add("requirement_removed")
messages = messages.Add(ctx, source, node, nil, NewSuccessSignal(signal.ID()))
}
default:
messages = messages.Add(ctx, source, node, nil, NewErrorSignal(signal.ID(), "unknown_action"))
}
} else {
messages = messages.Add(ctx, source, node, nil, NewErrorSignal(signal.ID(), "not_unlocked"))
}
2023-10-07 23:00:07 -06:00
return messages, changes
}
2023-10-07 23:00:07 -06:00
func (ext *LockableExt) HandleSuccessSignal(ctx *Context, node *Node, source NodeID, signal *SuccessSignal) (Messages, Changes) {
var messages Messages = nil
var changes Changes = nil
if source == node.ID {
2023-10-07 23:00:07 -06:00
return messages, changes
}
2023-11-03 22:51:54 -06:00
info, info_found := node.ProcessResponse(ext.WaitInfos, signal)
if info_found == true {
state, found := ext.Requirements[info.NodeID]
if found == false {
ctx.Log.Logf("lockable", "Got success signal for requirement that is no longer in the map(%s), ignoring...", info.NodeID)
} else {
ctx.Log.Logf("lockable", "got mapped response %+v for %+v in state %s", signal, info, ReqStateStrings[state])
switch state {
case Locking:
switch ext.State {
case Locking:
ext.Requirements[info.NodeID] = Locked
locked := 0
for _, s := range(ext.Requirements) {
if s == Locked {
locked += 1
}
}
2023-11-03 22:51:54 -06:00
if locked == len(ext.Requirements) {
ctx.Log.Logf("lockable", "WHOLE LOCK: %s - %s - %+v", node.ID, ext.PendingID, ext.PendingOwner)
ext.State = Locked
ext.Owner = ext.PendingOwner
changes = changes.Add("locked")
messages = messages.Add(ctx, *ext.Owner, node, nil, NewSuccessSignal(ext.PendingID))
} else {
changes = changes.Add("partial_lock")
ctx.Log.Logf("lockable", "PARTIAL LOCK: %s - %d/%d", node.ID, locked, len(ext.Requirements))
}
case AbortingLock:
ext.Requirements[info.NodeID] = Unlocking
2023-11-03 22:51:54 -06:00
lock_signal := NewLockSignal("unlock")
ext.WaitInfos[lock_signal.Id] = node.QueueTimeout(info.NodeID, lock_signal, 100*time.Millisecond)
messages = messages.Add(ctx, info.NodeID, node, nil, lock_signal)
ctx.Log.Logf("lockable", "sending abort_lock to %s for %s", info.NodeID, node.ID)
}
2023-11-03 22:51:54 -06:00
case AbortingLock:
ctx.Log.Logf("lockable", "Got success signal in AbortingLock %s", node.ID)
fallthrough
case Unlocking:
ext.Requirements[source] = Unlocked
unlocked := 0
for _, s := range(ext.Requirements) {
if s == Unlocked {
unlocked += 1
}
2023-08-15 18:23:06 -06:00
}
2023-11-03 22:51:54 -06:00
if unlocked == len(ext.Requirements) {
old_state := ext.State
ext.State = Unlocked
ctx.Log.Logf("lockable", "WHOLE UNLOCK: %s - %s - %+v", node.ID, ext.PendingID, ext.PendingOwner)
if old_state == Unlocking {
previous_owner := *ext.Owner
ext.Owner = ext.PendingOwner
ext.ReqID = nil
changes = changes.Add("unlocked")
messages = messages.Add(ctx, previous_owner, node, nil, NewSuccessSignal(ext.PendingID))
} else if old_state == AbortingLock {
changes = changes.Add("lock_aborted")
messages = messages.Add(ctx, *ext.PendingOwner, node, nil, NewErrorSignal(*ext.ReqID, "not_unlocked"))
ext.PendingOwner = ext.Owner
}
} else {
changes = changes.Add("partial_unlock")
ctx.Log.Logf("lockable", "PARTIAL UNLOCK: %s - %d/%d", node.ID, unlocked, len(ext.Requirements))
2023-08-15 18:23:06 -06:00
}
}
}
}
2023-10-07 23:00:07 -06:00
return messages, changes
}
// Handle a LockSignal and update the extensions owner/requirement states
2023-10-07 23:00:07 -06:00
func (ext *LockableExt) HandleLockSignal(ctx *Context, node *Node, source NodeID, signal *LockSignal) (Messages, Changes) {
var messages Messages = nil
var changes Changes = nil
switch signal.State {
case "lock":
2023-11-03 22:51:54 -06:00
switch ext.State {
case Unlocked:
if len(ext.Requirements) == 0 {
2023-08-15 18:23:06 -06:00
ext.State = Locked
new_owner := source
ext.PendingOwner = &new_owner
ext.Owner = &new_owner
2023-10-08 02:22:02 -06:00
changes = changes.Add("locked")
messages = messages.Add(ctx, new_owner, node, nil, NewSuccessSignal(signal.ID()))
} else {
2023-08-15 18:23:06 -06:00
ext.State = Locking
id := signal.ID()
ext.ReqID = &id
2023-08-15 18:23:06 -06:00
new_owner := source
ext.PendingOwner = &new_owner
ext.PendingID = signal.ID()
2023-10-08 02:22:02 -06:00
changes = changes.Add("locking")
2023-11-03 22:51:54 -06:00
for id, state := range(ext.Requirements) {
if state != Unlocked {
ctx.Log.Logf("lockable", "REQ_NOT_UNLOCKED_WHEN_LOCKING")
}
2023-11-03 22:51:54 -06:00
2023-08-15 18:23:06 -06:00
lock_signal := NewLockSignal("lock")
2023-11-03 22:51:54 -06:00
ext.WaitInfos[lock_signal.Id] = node.QueueTimeout(id, lock_signal, 100*time.Millisecond)
ext.Requirements[id] = Locking
messages = messages.Add(ctx, id, node, nil, lock_signal)
}
2023-08-15 18:23:06 -06:00
}
2023-11-03 22:51:54 -06:00
default:
messages = messages.Add(ctx, source, node, nil, NewErrorSignal(signal.ID(), "not_unlocked"))
2023-11-03 22:51:54 -06:00
ctx.Log.Logf("lockable", "Tried to lock %s while locked", node.ID)
2023-08-15 18:23:06 -06:00
}
case "unlock":
if ext.State == Locked {
if len(ext.Requirements) == 0 {
ext.State = Unlocked
new_owner := source
ext.PendingOwner = nil
ext.Owner = nil
2023-10-08 02:22:02 -06:00
changes = changes.Add("unlocked")
messages = messages.Add(ctx, new_owner, node, nil, NewSuccessSignal(signal.ID()))
2023-08-15 18:23:06 -06:00
} else if source == *ext.Owner {
ext.State = Unlocking
id := signal.ID()
ext.ReqID = &id
2023-08-15 18:23:06 -06:00
ext.PendingOwner = nil
ext.PendingID = signal.ID()
2023-10-08 02:22:02 -06:00
changes = changes.Add("unlocking")
2023-11-03 22:51:54 -06:00
for id, state := range(ext.Requirements) {
if state != Locked {
ctx.Log.Logf("lockable", "REQ_NOT_LOCKED_WHEN_UNLOCKING")
2023-08-15 18:23:06 -06:00
}
2023-11-03 22:51:54 -06:00
2023-08-15 18:23:06 -06:00
lock_signal := NewLockSignal("unlock")
2023-11-03 22:51:54 -06:00
ext.WaitInfos[lock_signal.Id] = node.QueueTimeout(id, lock_signal, 100*time.Millisecond)
ext.Requirements[id] = Unlocking
messages = messages.Add(ctx, id, node, nil, lock_signal)
}
}
2023-08-15 18:23:06 -06:00
} else {
messages = messages.Add(ctx, source, node, nil, NewErrorSignal(signal.ID(), "not_locked"))
}
default:
ctx.Log.Logf("lockable", "LOCK_ERR: unkown state %s", signal.State)
}
2023-10-07 23:00:07 -06:00
return messages, changes
}
2023-11-03 22:51:54 -06:00
func (ext *LockableExt) HandleTimeoutSignal(ctx *Context, node *Node, source NodeID, signal *TimeoutSignal) (Messages, Changes) {
var messages Messages = nil
var changes Changes = nil
wait_info, found := node.ProcessResponse(ext.WaitInfos, signal)
if found == true {
state, found := ext.Requirements[wait_info.NodeID]
if found == true {
ctx.Log.Logf("lockable", "%s timed out %s", wait_info.NodeID, ReqStateStrings[state])
2023-11-03 22:54:28 -06:00
switch state {
case Locking:
ext.State = AbortingLock
ext.Requirements[wait_info.NodeID] = Unlocked
for id, state := range(ext.Requirements) {
if state == Locked {
ext.Requirements[id] = Unlocking
lock_signal := NewLockSignal("unlock")
ext.WaitInfos[lock_signal.Id] = node.QueueTimeout(id, lock_signal, 100*time.Millisecond)
messages = messages.Add(ctx, id, node, nil, lock_signal)
ctx.Log.Logf("lockable", "sent abort unlock to %s from %s", id, node.ID)
}
}
case Unlocking:
}
2023-11-03 22:51:54 -06:00
} else {
ctx.Log.Logf("lockable", "%s timed out", wait_info.NodeID)
}
}
return messages, changes
}
// LockableExts process Up/Down signals by forwarding them to owner, dependency, and requirement nodes
// LockSignal and LinkSignal Direct signals are processed to update the requirement/dependency/lock state
2023-10-07 23:00:07 -06:00
func (ext *LockableExt) Process(ctx *Context, node *Node, source NodeID, signal Signal) (Messages, Changes) {
var messages Messages = nil
var changes Changes = nil
switch signal.Direction() {
case Up:
if ext.Owner != nil {
if *ext.Owner != node.ID {
messages = messages.Add(ctx, *ext.Owner, node, nil, signal)
2023-07-09 14:30:30 -06:00
}
2023-07-27 12:20:49 -06:00
}
2023-10-07 23:00:07 -06:00
2023-07-27 12:20:49 -06:00
case Down:
2023-10-07 23:00:07 -06:00
for requirement := range(ext.Requirements) {
messages = messages.Add(ctx, requirement, node, nil, signal)
2023-07-27 12:20:49 -06:00
}
2023-10-07 23:00:07 -06:00
case Direct:
switch sig := signal.(type) {
case *LinkSignal:
2023-10-07 23:00:07 -06:00
messages, changes = ext.HandleLinkSignal(ctx, node, source, sig)
case *LockSignal:
2023-10-07 23:00:07 -06:00
messages, changes = ext.HandleLockSignal(ctx, node, source, sig)
case *ErrorSignal:
2023-10-07 23:00:07 -06:00
messages, changes = ext.HandleErrorSignal(ctx, node, source, sig)
case *SuccessSignal:
2023-10-07 23:00:07 -06:00
messages, changes = ext.HandleSuccessSignal(ctx, node, source, sig)
2023-11-03 22:51:54 -06:00
case *TimeoutSignal:
messages, changes = ext.HandleTimeoutSignal(ctx, node, source, sig)
2023-07-27 16:21:27 -06:00
default:
}
default:
2023-07-24 17:07:27 -06:00
}
2023-10-07 23:00:07 -06:00
return messages, changes
2023-07-25 21:43:15 -06:00
}
type RequirementOfPolicy struct {
PerNodePolicy
}
func NewRequirementOfPolicy(dep_rules map[NodeID]Tree) RequirementOfPolicy {
return RequirementOfPolicy {
PerNodePolicy: NewPerNodePolicy(dep_rules),
}
}
func (policy RequirementOfPolicy) ContinueAllows(ctx *Context, current PendingACL, signal Signal) RuleResult {
sig, ok := signal.(*ReadResultSignal)
if ok == false {
return Deny
}
ext, ok := sig.Extensions[LockableExtType]
if ok == false {
return Deny
}
reqs_ser, ok := ext["requirements"]
if ok == false {
return Deny
}
reqs_type, _, err := DeserializeType(ctx, reqs_ser.TypeStack)
if err != nil {
return Deny
}
reqs_if, _, err := DeserializeValue(ctx, reqs_type, reqs_ser.Data)
if err != nil {
return Deny
}
requirements, ok := reqs_if.Interface().(map[NodeID]ReqState)
if ok == false {
return Deny
}
for req, _ := range(requirements) {
if req == current.Principal {
return policy.NodeRules[sig.NodeID].Allows(current.Action)
}
}
return Deny
}